Security Experts:

long dotted

NEWS & INDUSTRY UPDATES

A Middle Eastern threat group has been using a Flash Player zero-day vulnerability to deliver FinFisher spyware [Read More]
Cyber espionage group known as Bronze Butler and Tick, which researchers linked to China, continues to target Japan using custom malware and a zero-day [Read More]
Increasing number of organizations moved to Office 365, but many haven’t migrated due to security concerns, including ransomware and phishing [Read More]
Microsoft patches 62 vulnerabilities, including a critical Office zero-day exploited to deliver data-stealing malware [Read More]
Attackers inject themselves into ongoing email exchanges in highly targeted spear-phishing attacks aimed at entities around the world [Read More]
EFF warns of sophisticated spear-phishing attacks targeting Internet freedom NGOs “Fight for the Future” and “Free Press” [Read More]
According to a new report, an average of 1.385 million unique new phishing sites are created every month, peaking at 2.3 million in May 2017. [Read More]
Equifax advised victims of the recent breach on Twitter to access a fake support website instead of equifaxsecurity2017.com [Read More]
Iranian hackers target aerospace and energy organizations in the US, Saudi Arabia and South Korea [Read More]
DMARC effectively whitelists the genuine emails from genuine domains, so that ISPs and receiving organizations (such as universities) can reject or block spoofed mails. [Read More]

FEATURES, INSIGHTS // Phishing

rss icon

Ram Mohan's picture
Cybercriminals have enough information to construct highly targeted phishing attacks. So, how can you mitigate the risk of falling victim to spear-phishing attacks?
Idan Aharoni's picture
Unlike real-world dumpster diving, "electronic dumpster diving" can enable cybercriminals to access all the documents currently held by the user, not just those that were thrown away.
Greg Olsen's picture
These best practices for DKIM can help you get more email delivered and lower the likelihood that a message will be categorized as spam.
Noa Bar-Yosef's picture
An Inside Look at Some of the Strategies and Tactics Cybercriminals Use to Conduct Successful Phishing Attacks
Noa Bar-Yosef's picture
Second column in a series describing the hottest commodities found in underground markets. We continue to explore the trending “commodities” in these markets and how to protect from your data being exchanged in these markets.
Mike Lennon's picture
Enjoy this selection of top picks for 2010, listed in no particular order. Happy New Year!