Avanan Blog Attack Briefs (7)


The Cloud Storage Re-Up Attack

Hackers always try to prey on end-users’ fear, uncertainty, and doubt. It’s all about tricking end-users into doing something they don’t want to do–namely, handing o...

Read more

How Does Ransomware Spread?

Ransomware. The word is enough to send shivers down any IT professional's spine.

Read more

Why Do Governments Get Hacked So Often?

Governments are among the most attacked industries in the world. Why? Because they hold incredible amounts of data. That data is gold for hackers.

Read more

BEC 3.0 - Legitimate Sites for Illegitimate Purposes 

Security services have a problem and it’s called BEC 3.0.

Read more

Beware of the Microsoft Voice Scam

Dynamics 365 Customer Voice is a Microsoft product that is used primarily to gain feedback from customers.

Read more

BEC 2.0 - Conversation Hijacking Exploits Accounting Teams into Payment Remittance  

One of the most financially devastating attacks is Business Email Compromise (BEC). In 2021, the FBI found that BEC-related complaints added up to $2.4 billion. For ...

Read more

Business Email Compromise Scam Leads to Credential Harvesting Evernote Page

Business Email Compromise attacks are one of the fastest-growing and most difficult-to-stop attacks in the cybersecurity space. There are a number of variants, but i...

Read more

PhishPal: How PayPal Became a Hackers’ Haven

In July of last year, we wrote about a new campaign where hackers are sending phishing emails and malicious invoices directly from PayPal.

Read more

Using Geotargeting to Customize Phishing

In a global marketplace, the ability to geotarget is huge.

Read more

14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial