Recursive credential phishing for ESPs
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
13 articles
Cybercriminals prey on access to mailing tools by sending phishing emails through these same tools.
Cybercriminals send the Remcos remote-access trojan under the guise of letters from a new client.
Hackers are distributing the QBot trojan through business correspondence.
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
If you receive an e-mail of dubious authenticity, analyze it yourself. Here’s how.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
Phishing links in e-mails to company employees often become active after initial scanning. But they still can and must be caught.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.
Companies worldwide regularly fall victim to business e-mail compromise attacks. We explain the danger and how to minimize it.
Cybercriminals take control of corporate mail accounts to send filter-dodging spam.