What is Spear Phishing?

Learn how spear phishing tricks users into providing confidential information and ways to protect yourself against it.
Anti-Phishing Software – A Growing Necessity for Google Services

In this blog, we will show how attackers take their creativeness to the next level by leveraging Google services in order to orchestrate new types of phishing attacks.
BEC: You Have (Almost) Been Compromised!

Learn more about BEC (Business Email Compromise), an impersonation-based attack leveraging social engineering techniques.