As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...
As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...
Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.
A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.
As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...
As long as COVID-19 vaccines have been readily available, there have been scammers looking to profit from it. According to Check Point Research, the following have b...
October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...
When you share a link on LinkedIn, and the URL is over 26 characters, LinkedIn will automatically shorten it, as per its policy. You may have seen it while perusing ...
An easy way to determine if an email is suspicious is by looking at sender reputation. It’s no wonder, then, as we found in our 1H Cyber Attack Report, that 84.3% of...
An Allow List is a simple concept. Essentially, it's a list of addresses or domains that you've deemed safe, and thus emails from those addresses or domains shouldn'...
Oftentimes, you'll receive an email that says to call a number. It can be for anything—refunds, ask questions, etc.
Have you ever seen an email like this come across your inbox?
A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz. Read the first article here.
Ordering online is easy.
Many countries and cities around the world are instituting a so-called COVID pass. The idea is that an app will show a person’s vaccination status or proof of negati...
Hackers have a long history of trying to obfuscate their true intent. We've written about this extensively, whether it's MetaMorph, SiteCloak, ZeroFont, baseStriker ...
Avanan researchers have discovered a new attack, whereby hackers can use DocuSign to send malicious documents and phishing links
Avanan researchers have uncovered an attack that spoofs an automobile accident report. Here's what it looks like:
A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz.
A big winner over the pandemic has been the use of collaboration apps. That includes Microsoft Teams and Slack and Zoom, but there are countless apps across the web ...
Attackers have found a consistent way to bypass SEG filters and get to the inbox. We've written about it a lot lately, in large part because we continue to see tons ...