Avanan Blog Attack Briefs (4)


Cyber Criminals Phishing via Google Looker Studio

Today, we’re writing about cyberattacks we’re seeing via Google Looker Studio and other Google applications. Google Looker Studio is a powerful data visualization so...

Read more

BEC in Personal Email

By now, you know full well what BEC is. It's receiving a message, usually from someone pretending to be a higher-up, and asking for information. These are incredibly...

Read more

Video: Spoofing Zelle to Steal Credentials

Zelle, the money-transfer service, is a favorite of hackers to spoof. We've written about it in detail. In this video, we walk you through what a typical Zelle scam ...

Read more

Phishing via AWS

The hottest trend in the phishing world is leveraging legitimate services to send illegitimate messages.

Read more

Phishing via SharePoint

We’ve been writing recently about how hackers are utilizing legitimate services to send out phishing campaigns.

Read more

Phishing via Google Ads

Ads make the internet go round. And nobody does more with online ads than Google.

Read more

Phishing via Google Collections

Google Collection is a cool tool that allows you to save links, images and videos and share them with others.

Read more

The Automatic Forwarding Problem in Action

Last year, we wrote about a story we heard. Someone who was using an API-based competitor for email security told us about a mail rule they have: every email that go...

Read more

Google Docs Phishing

Using the comment feature in Google Docs represents another instance in the evolution of BEC 3.0. Utilizing legitimate sites makes it easy for hackers to end up in t...

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial