Microsoft Outlook is built for productivity. That means they offer helpful tools designed to supercharge and streamline daily work.
Microsoft Outlook is built for productivity. That means they offer helpful tools designed to supercharge and streamline daily work.
One of the most pernicious computer viruses in history was called Nimda. Though it propagated in many ways, it specialized in spreading via an email attachment.
The majority of all phishing attacks are of the credential harvesting variety.
Avanan researchers have uncovered vulnerabilities in both Microsoft ATP and Proofpoint. In this vulnerability, links in the email body can pass scanners uninspected,...
Did you go wild spending on Black Friday? In anticipation of a shipping crunch, did you seek further afield sellers to find what your friends and family are looking ...
The holidays are approaching, and there appears to be a shipping crunch. Due to supply chain concerns, many are worried that they won’t get their holiday gifts in ti...
Business Email Compromise attacks have exploded in popularity. Gartner has found that BECs increased by nearly 100% in 2019 and through 2023, they predict that BEC a...
In 2018, Avanan researchers discovered the ZeroFont phishing technique, whereby hackers insert hidden words, all with a font size of zero, that is invisible to the r...
As holiday shopping begins earlier this year due to supply chain issues, many are beginning to stock up, especially from Amazon. For hackers, it’s an opportunity to ...
Last week, we wrote about a scam that spoofs the World Health Organization (WHO) in the hopes of grabbing personal information.
A simple, but effective, way to bypass traditional scanners is by adding the recipient as a BCC.
As governments around the world have paid out relief checks during the COVID-19 crisis, it might seem reasonable to receive some form of email communication from gov...
As long as COVID-19 vaccines have been readily available, there have been scammers looking to profit from it. According to Check Point Research, the following have b...
October is National Cybersecurity Awareness Month. Each week has a theme. This week's theme? Fight the Phish. This blog shows a typical impersonation attack and how ...
When you share a link on LinkedIn, and the URL is over 26 characters, LinkedIn will automatically shorten it, as per its policy. You may have seen it while perusing ...
An easy way to determine if an email is suspicious is by looking at sender reputation. It’s no wonder, then, as we found in our 1H Cyber Attack Report, that 84.3% of...
An Allow List is a simple concept. Essentially, it's a list of addresses or domains that you've deemed safe, and thus emails from those addresses or domains shouldn'...
Oftentimes, you'll receive an email that says to call a number. It can be for anything—refunds, ask questions, etc.
Have you ever seen an email like this come across your inbox?
A post in occasional series about the ins and outs of data science, by senior AI researcher Natan Katz. Read the first article here.