• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: phishing

Microsoft OAuth Phishing

Microsoft Warns of OAuth Phishing Campaign

Microsoft says the campaign uses OAuth request links to trick users into granting consent to an app that gives hackers access to email.

January 25, 2022 Zachary Comeau Leave a Comment

Microsoft says it is tracking a new consent phishing campaign that uses OAuth request links to trick users into granting consent to an app that gives malicious actors access to email accounts. In a series of tweets, Microsoft Security Intelligence says phishing messages misled users into granting permissions to an app called “Upgrade” that gave […]

Read More

Phishing Success

The Most Imitated Brands in Phishing Attempts

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals via sophisticated phishing techniques.

January 25, 2022 TD Staff Leave a Comment

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques. Twenty-three percent of all brand phishing attempts were related to DHL, up from just 9% in the previous quarter, according to Check Point Research’s latest Q4 brand phishing report. […]

Read More

Smishing and Phishing PKI

Concerned About Phishing and Smishing Attacks? PKI Can Help.

Enterprises can deploy PKI to shore up network infrastructure to prevent email phishing and its text-based offshoot, smishing.

November 3, 2021 Ed Giaquinto Leave a Comment

Just about everyone is familiar with the concept of “phishing” attacks. Scammers and cybercriminals have been using them for nearly as long as email has been around, sending thousands (even millions) of emails designed to trick recipients into giving away money, personal information, or other valuables. Phishing was one of the earliest cyberattacks based on […]

Read More

Phishing Success rates

Tessian Report: Top Malicious Email Phishing Techniques Used By Cybercriminals

Tessian report reveals two million malicious emails bypassed email defenses and the most common phishing techniques used by cybercriminals.

September 22, 2021 Alyssa Borelli Leave a Comment

Tessian report reveals two million malicious emails bypassed email defenses and the most common phishing techniques used by cybercriminals.

Read More

Hackers use morse code to evade detection

Hackers Used Morse Code In This Phishing Attack

Hackers' are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

August 18, 2021 Alyssa Borelli Leave a Comment

Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

Read More

Phishing

Microsoft Warns of Sneaky Phishing Campaign

August 2, 2021 Zachary Comeau Leave a Comment

Microsoft is warning of an active phishing campaign that uses a combination of techniques to evade detection and trick users into giving up their credentials. In a series of Tweets and updates on GitHub, Microsoft’s security team says the active phishing campaign uses a “craft combination” of legitimate-looking original sender email addresses, spoofed display sender […]

Read More

Phishing Success

Ivanti: IT Is Losing The Phishing Fight

Troubling new research from Ivanti finds nearly half of phishing attempts against IT professionals are successful.

July 21, 2021 Zachary Comeau Leave a Comment

New research from IT management software company Ivanti finds that IT departments are losing the fight against phishing attacks, with nearly half of phishing attempts against IT professionals – the very people tasked with defending corporate networks – actually succeeding. The company surveyed over 1,000 enterprise IT professionals across the U.S., U.K., France, Germany, Australia, […]

Read More

Malware

Report: Phishing Still Major Cause of Ransomware As Average Costs Reach $400K

Ransomware costs are well over six figures as phishing remains one of the most common intrusion vector, new report finds.

July 19, 2021 Zachary Comeau Leave a Comment

Ransomware operators are as determined as ever to penetrate networks and hold data hostage for six-figure payments despite companies boosting their network defenses, and costs of a ransomware attack are increasing as a result, according to a new report. Cloudian, an enterprise data storage company and provider of backup solutions, recently released a report that […]

Read More

Phishing

Mimecast Acquires Machine Learning Phishing Security Firm MessageControl

Mimecast has acquired MessageControl, a messaging security provider with solutions to respond to the increase in phishing attacks.

August 3, 2020 Zachary Comeau Leave a Comment

Email and data security company Mimecast has acquired eTorch, a messaging security provider with solutions to help stop social engineering and human identity attacks using machine learning technology. In a press release, Mimecast said the acquisition of eTorch — which does business as MessageControl — strengthens the company’s email security strategy designed to improve security […]

Read More

Phishing Success

Microsoft Seizes Domains Used in COVID-19 Phishing Attacks

Microsoft took action to stop a cybercriminal network from launching phishing attacks designed to take advantage of the COVID-19 pandemic.

July 8, 2020 Zachary Comeau Leave a Comment

Microsoft took action to stop a cybercriminal network from launching coronavirus-related phishing attacks, according to newly unsealed court records. In a blog post, the company detailed its actions taken in the case, which now includes seizing control of key domains in the criminals’ infrastructure to prevent future attacks. The U.S. District Court for the Eastern […]

Read More

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Page 5
  • Interim pages omitted …
  • Page 37
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.