Tag: Cyber attack

How to Prevent Phishing Attacks

Learn about common phishing attacks, challenges in detecting phishing, and advanced technologies that will help organizations prevent phishing attacks.

How to Conduct a Phishing Attack in a 5 Easy Steps

Phishing is cybercrime’s oldest threat and it continues to be one of the most trending attacks on individuals and organizations alike. In this blog post we discuss recent players on the cyberattack scene: script kiddies, and their methods that make phishing so easy, even for the inexperienced.
face masks bec scams

BEC Scams: Mimecast Spoofing

Learn about a BEC scam comprised of two layers: spoofing a user’s email address and a phishing attempt to get Office 365 log-in credentials.
old phones phishing site

Campaign Alert: Call Me ASAP

Learn how attackers take an email address and insert it into the account name so users believes the site is legitimate in a recent campaign.
paper stack phishing mail

Incident Report: Fax Attack

Learn how a fax attack tricks employees into click on a phishing link by leveraging known cybersecurity service, EFax.