If you get an email from your CFO requesting urgent action, what do you do?
If you get an email from your CFO requesting urgent action, what do you do?
We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...
Amazon Web Services (AWS) is one of the most popular cloud storage and hosting solutions. From major companies hosting their work on the service, to individuals usin...
Hackers spoof brands all the time. They are usually popular brands, such as Microsoft or Apple.
Lucidchart is a popular site used to collaborate on drawings, charts, diagrams and more.
The hacker has two tasks: Get into the inbox. And get the user to hand over the desired information. Hackers spend tons of time thinking of creative ways to do both....
In June, we wrote about how hackers were sending phishing emails directly from QuickBooks.
It’s practically a holiday at this point: Amazon Prime Day. Two days of ridiculous deals and savings.
Credential harvesting remains the most popular form of phishing.
Hackers continually impersonate trusted brands to get into the inbox. By leveraging the legitimacy of a trusted domain, security solutions are more likely to view th...