Search Results for: phishing Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and... Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Blog Post 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate... Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero... Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... Blog Post Prices of Phishing Kit Rise By 149% April 20, 2020 91% of cyberattacks and data breaches started with phishing emails. Phishing is a great threat to steal financial information, intellectual... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
Knowledge Center PHISHING INFRASTRUCTURE May 12, 2021 Phishing Capabilities Demonstration The goal of this whitepaper is to summarize technical details of a phishing infrastructure we developed and...
Blog Post The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate...
Blog Post Phishing PDF Document Story March 24, 2020 Background A few days ago, the LIFARS Monitoring team detected a PDF file in the client network with a non-zero...
Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
Blog Post Prices of Phishing Kit Rise By 149% April 20, 2020 91% of cyberattacks and data breaches started with phishing emails. Phishing is a great threat to steal financial information, intellectual...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...