Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Business Email Compromise (BEC) attacks are some of the most popular and devastating attacks out there. They work, broadly, by sending an email from a spoofed or leg...
Earlier today, we published an attack brief on how scammers are leveraging the name of Google Translate to get into the inbox. It's a social engineering scam that la...
Popular sites convey legitimacy to the end user. A user is more likely to click on something that looks like Google than something they’ve never seen before.
A few weeks ago, we wrote about how threat actors are using the Facebook Ad Manager to send credential harvesting links.
A successful credential harvesting scam can have devastating consequences.
Check Point Research has uncovered a two-year-long campaign that is still going and making waves. The campaign starts by using spear-phishing and then sends maliciou...
Eight million businesses advertise their products on Facebook.
Spoofing brands is a common form of phishing.
Everybody loves a giveaway.
Microsoft has reported on a new man-in-the-middle phishing campaign, which targeted over 10,000 organizations in the last year.