How cybercriminals disguise URLs
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
44 articles
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Microsoft plans to throttle and block email from vulnerable Exchange servers to Exchange Online.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
Methods of reasonable protection against potential freelancer related cyberthreats.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool.
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.
Why using a corporate mail account for personal matters is not a good idea
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.