This section has all the newest information on phishing, such as new tricks that attackers are using, well-known phishing scams, and effective ways to stop them. Keep up with how phishing is changing, what the big cases are, and how to spot and avoid phishing attempts. Our coverage keeps you up to date on this ongoing threat and how to keep your business and yourself safe.
Menlo Security, a leader in Secure Enterprise Browsers, has released its annual State of Browser Security Report, revealing a sharp…
A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to be from Coinbase. The scam attempts…
In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,…
In a sophisticated phishing campaign uncovered by the BI.ZONE Threat Intelligence team, the Squid Werewolf group, also known as APT37,…
A highly sophisticated phishing campaign has been uncovered exploiting Microsoft 365's trusted infrastructure to facilitate credential harvesting and account takeover…
Amazon Web Services' Simple Notification Service (AWS SNS) is a versatile cloud-based pub/sub service that facilitates communication between applications and…
Threat researchers at Proofpoint are currently tracking two sophisticated and highly targeted cyber-attack campaigns that are utilizing OAuth redirection mechanisms…
Hackers have been targeting Microsoft Copilot, a newly launched Generative AI assistant, to carry out sophisticated phishing attacks. This campaign…
In recent years, phishing has remained the most prevalent form of cyberattack, with approximately 1.2% of global email traffic being…
North Korean state-sponsored hackers, known as APT37 or ScarCruft, have been employing sophisticated tactics to breach systems, leveraging malicious ZIP…