phishing

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass

Barracuda, Featured, phishing, Phishing Attacks, Security, Syndicated, URL protection

New report: BEC accounts for 1 in 10 email attacks

Email-based social engineering threats are thriving as attackers continue to adapt and evolve their tactics to increase their chances of success. The

Barracuda, email, email compromise, email threats, Featured, phishing, Security, social engineering, Syndicated

5 Ways cybercriminals are using AI: Access and credential theft

Threat actors have embraced artificial intelligence (AI) for phishing, deepfakes, malware generation, content localization, and more. This week we’re looking at how they’re using

brute force attacks, Deepfakes, Featured, malware, Passwords, phishing, Security, stolen credentials, Syndicated

QR code phishing: What MSPs need to know to protect their customers

In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick

email protection, Featured, malware, phishing, QR code, quishing, Security, Syndicated

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language

cybersecurity, data poisoning, Featured, generative AI, malware, phishing, ransomware, Security, Syndicated

Cybersecurity Threat Advisory: TA558 phishing campaign

The threat actor TA558 is conducting a phishing campaign targeting various sectors in Latin America, intending to deploy the remote

Cybersecurity Threat Advisory, Featured, phishing, remote access, Security, Syndicated, TA558, Venom RAT

Cybersecurity Threat Advisory: StrelaStealer malware targets organizations

A new email threat, StrelaStealer malware, is targeting Europe and United States organizations. It spreads through phishing emails with attachments

Cybersecurity Threat Advisory, Featured, malware, Outlook, phishing, Security, StrelaStealer, Syndicated

Five ways cybercriminals use AI to wreak havoc

It seems that each time there is a new technology advancement, criminals quickly cut to the front of the line

AI, ChatGPT, Deepfake, Featured, malware, phishing, Security, Syndicated

How to help your clients comply with new Google and Yahoo email requirements

When it comes to email security, most of the focus is on what happens when a malicious email is received.

DMARC, DNS, email, Featured, Google, MSP, phishing, Security, Syndicated, Yahoo