When it comes to an organization’s security, business email compromise (BEC) attacks are a big problem. One primary reason impacts are so significant is that…
It’s common knowledge that attackers often use email as a delivery mechanism for their malicious activity — which can range from enticing victims to click…
We recently found an interesting phishing kit on a compromised website that has QR code capabilities, along with the ability to control the phishing page…
This summer, MalwareBytes researcher Jérôme Segura wrote an article about how criminals use image files (.ico) to hide JavaScript credit card stealers on compromised e-commerce…
During a recent investigation, a Magento admin login phishing page was found on a compromised website using the file name wp-order.php. This is an odd…
Employees at companies of all sizes can be targets of phishing attacks, but certain corporations or industries can be more valuable to an attacker than…
Email will continue to be the dominant mode of digital communication for the foreseeable future. However, the email framework was not designed with security in…
Imagine a lonely person who’s looking for romantic companionship, so they turn to the internet. Picture someone who’s terribly anxious for news about an online…