Phishing | News, how-tos, features, reviews, and videos

SMS phishing / smishing  >  Mobile phone displays text bubble with skull + crossbones
trojan horse malware virus binary by v graphix getty


Chinese APT group Mustang Panda targets European and Russian organizations

Latest campaigns by Mustang Panda highlight the threat actor's versatility in terms of the tools and techniques it is able to use.

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

10 top anti-phishing tools and services

Some of these solutions will help find and stop phishing emails before they can cause damage, while others will find phishers fraudulently using your business's brand.

A hook is cast at laptop email with fishing lures amid abstract data.

What is phishing? Examples, types, and techniques

Phishing is a type of cyberattack that uses disguised email to trick the recipient into giving up information, downloading malware, or taking some other desired action.

phishing fishing lure bait binary hack security breach

What is spear phishing? Examples, tactics, and techniques

Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.

A hand controls a small marionette. [control / manipulation / social engineering]

5 old social engineering tricks employees still fall for, and 4 new gotchas

Despite all the training and warnings, people still fall for these simple social engineering scams. What's worse, cybercriminals continue to come up with new ones.

The shadow of hand unsettlingly hovers over a keyboard.

FBI: Victims lost nearly $7 billion to cybercrime in 2021

New statistics from the FBI show that more than 847,000 complaints of suspected internet-based crime were made in the past year.

newspaper on fire inherit it mess fire risk alert disaster data center network room by elijah odonn

8 IT security disasters: Lessons from cautionary examples

An attack needs to really stand out to earn the name "disaster."

Phishing attack   >   A fish hook hover above binary code with a caution triangle.

Facebook and Microsoft are the most impersonated brands in phishing

Phishing pages impersonating Facebook and Microsoft contributed a little more than 25% of all phishing pages analyzed in a new report by Vade, while financial organizations comprised the hardest-hit sector overall.

ransomware attack

Ransomware is top cyberattack type, as manufacturing gets hit hardest

Ransomware was the number one attack type in 2021 as phishing and vulnerability exploits were top infection vectors, according to the IBM X-Force Threat Intelligence Index.

Fraud / deception / social engineering  >  A wolf in sheep's clothing in a binary environment.

Social engineering: Definition, examples, and techniques

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. Train yourself to spot the signs.

hot and cold fire and ice clash temperature

7 hot cybersecurity trends (and 2 going cold)

Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.

targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

Security lessons from 2021 holiday shopping fraud schemes

Here are four ways fraudsters targeted the 2021 shopping period with insight into how retailers can prevent and defend against exploitation.

cybersecurity controls

The 7 CIS controls you should implement first

The CIS Critical Security Controls list (formerly the SANS Top 20 controls) has been the gold standard for security defense advice. These are the tasks you should do first.

email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

Cybersecurity  >  Email security threats, such as phishing

4 steps to protect the C-suite from business email compromise attacks

Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.

Social media threat / danger / risk >  Text bubbles interact, one bearing skull + crossbones

Social engineering: How criminals exploit human behavior

Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems or data.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Cybersecurity  >  Email security threats, such as phishing

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.

Load More
You Might Also Like