New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not […]
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not […]
Google SMTP relay service is wildly popular and used every day by legions of users. Unfortunately, hackers around the world are aware of this and increasingly they’ve begun abusing the […]
If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis […]
The owners of the Qbot botnet are changing things up. The botnet’s normal Modus Operandi for distributing their signature Qbot malware has been to push their malicious code via phishing […]
Emotet is in the news again according to the latest information from email security firm Cofense. Emotet is notorious for spreading via phishing campaigns and this latest phishing campaign sees […]
Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has […]
Are you a Citibank customer? If so, be aware that a group of scammers is specifically targeting Citibank account holders. The campaign is incredibly convincing, and the emails look just […]
Back in September of 2020 Microsoft announced that it was experimenting with the addition of SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online. This was done in a […]
There is a new phishing campaign to keep a watchful eye on according to email security firm INKY. It’s a particularly fiendish one. The attackers have designed an email template […]
Scammers delight in impersonating government agencies and well-known brands to lure email recipients into giving up their personal information. That information is then either exploited directly or sold to the […]