Two-stage Dropbox spear phishing
Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
10 articles
Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
Why using a corporate mail account for personal matters is not a good idea
Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
One explanation of phishing success lies in a known psychological effect.
The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.