Security Experts:

long dotted


Former Air Force intelligence officer, Monica Elfriede Witt, has been charged with providing secret U.S. information to the Iranian government. [Read More]
A recent phishing attack targeting mobile users leveraged Google Translate to serve fake login pages to Google and Facebook users. [Read More]
Netcraft launches mobile app designed to protect users against phishing and other attacks. Android version available and iOS version coming soon. [Read More]
Alphabet’s Jigsaw unit has published a quiz that tests users’ ability to identify phishing attacks and teaches them what signs to look for to determine if a message is legitimate or not. [Read More]
A recently addressed vulnerability in Office 365 allowed attackers to bypass existing phishing protections and deliver malicious messages to victims’ inboxes. [Read More]
A phishing template used in recent attacks targeting customers of a major U.S. bank uses fake fonts to evade detection, Proofpoint security researchers warn. [Read More]
Phishing attacks have become more targeted and sophisticated and also show a focus on enterprises, Cyren reports. [Read More]
A security research project called DeepPhish examined the extent to which ML technologies can genuinely aid in the detection of phishing, and the extent to which those same technologies could be used by cybercriminals to by-pass anti-phishing defenses. [Read More]
INKY combines machine learning algorithms to analyze content and computer vision techniques to analyze graphics in order to detect phishing emails. [Read More]
The Magecart hackers have now turned to vulnerable Magento extensions [Read More]


rss icon

Alastair Paterson's picture
Cybercriminals rely on tried and trusted methods for phishing; as long as there is even a four percent chance that phishing techniques will be successful, they will continue to use them.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Devon Kerr's picture
If phishing attacks slip past the first line of defense, security teams need to be able to identify suspicious activity and stop it before hackers can learn enough about their enterprise to execute a full attack.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Siggi Stefnisson's picture
Even though I've been analyzing malware for the past 20 years, I do understand that internet security is not merely a technical problem, but also a business problem.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Jack Danahy's picture
Is the appropriate response to blame the victim when increasingly sophisticated attacks and the rise in credential thefts are making any user’s goal of protecting themselves much more difficult?
Simon Crosby's picture
It’s hard keeping criminals from infiltrating networks, much less worrying that users will simply open the door to bad guys by letting their guard down.