• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • Latest News
  • About Us
    SEARCH

Search Results: phishing

Ukraine Phishing Email

Ukraine-related Phishing Emails Up More than 200%

Hackers are exploiting the Ukraine crisis to conduct donation scams, deploy malware and steal credentials, Tessian says.

April 6, 2022 Zachary Comeau Leave a Comment

Similar to how cybercriminals jumped on the COVID-19 and used the pandemic as a useful phishing lure, attackers are exploiting the Ukraine crisis to conduct email-based donation scams, deploy malware and steal credentials. According to email security firm Tessian, researchers are seeing Ukrainian-themed phishing emails skyrocket, with new domains containing “Ukraine” up more than 200% […]

Read More

Tessian phishing emails

Watch Out For This Chameleon Phishing Scheme

Trustwave SpiderLabs is warning of a chameleon-like phishing scheme that adapts its background page and logo depending on the user input.

March 25, 2022 TD Staff Leave a Comment

Security researchers at TrustWave SpiderLabs encountered a phishing scheme that acts like a chameleon by changing and blending its color based on its environment. The site adapts its background page and logo depending on the user input to trick victims into giving away their email credentials. The phishing scheme starts with an email asking the […]

Read More

Ukraine Phishing Email

Phishing, Ransomware Continue To Plague Businesses As Awareness Stagnates

Proofpoint phishing report finds that 60% organizations hit with ransomware in 2021 paid the ransom, but not all data is recovered.

February 22, 2022 Zachary Comeau Leave a Comment

More than two-thirds were infected with ransomware from a direct email payload, and 60% of those victims paid the ransom, according to new research from cybersecurity and compliance firm Proofpoint. The company’s 2022 State of the Phish Report, the results of a survey of 600 IT professionals and 3,500 workers, reveals that phishing and other […]

Read More

Phishing Bypass MFA

Phishing Attacks That Bypass MFA Could Become The Norm

Proofpoint says threat actors are increasingly leveraging phishing kits that can bypass mutli-factor authentication methods.

February 4, 2022 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) is now a standard cybersecurity practice—or at least it should be—across an organization’s IT environment. MFA has been proven to stop hackers from accessing accounts and thwart ransomware attacks from happening with compromised credentials alone. However, like with most IT security safeguards, cybercriminals are finding ways around it with phishing attacks that […]

Read More

Phishing

These Were The Top Phishing Topics in 2021

The pandemic and vaccination were the most common phishing topic among hackers in 2021, new report research says.

January 26, 2022 Zachary Comeau Leave a Comment

Phishing remains among the top security threats to any organization, as the attack vector is often where a hacker first attempts to steal credentials and access victim networks with the end goal of stealing secrets, deploying ransomware or other malicious activities. Since the start of the COVID-19 pandemic, phishing attempts have grown considerably, with nearly […]

Read More

Microsoft OAuth Phishing

Microsoft Warns of OAuth Phishing Campaign

Microsoft says the campaign uses OAuth request links to trick users into granting consent to an app that gives hackers access to email.

January 25, 2022 Zachary Comeau Leave a Comment

Microsoft says it is tracking a new consent phishing campaign that uses OAuth request links to trick users into granting consent to an app that gives malicious actors access to email accounts. In a series of tweets, Microsoft Security Intelligence says phishing messages misled users into granting permissions to an app called “Upgrade” that gave […]

Read More

Ukraine Phishing Email

The Most Imitated Brands in Phishing Attempts

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals via sophisticated phishing techniques.

January 25, 2022 TD Staff Leave a Comment

DHL has surpassed Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal credentials or deploy malware via sophisticated phishing techniques. Twenty-three percent of all brand phishing attempts were related to DHL, up from just 9% in the previous quarter, according to Check Point Research’s latest Q4 brand phishing report. […]

Read More

Smishing and Phishing PKI

Concerned About Phishing and Smishing Attacks? PKI Can Help.

Enterprises can deploy PKI to shore up network infrastructure to prevent email phishing and its text-based offshoot, smishing.

November 3, 2021 Ed Giaquinto Leave a Comment

Just about everyone is familiar with the concept of “phishing” attacks. Scammers and cybercriminals have been using them for nearly as long as email has been around, sending thousands (even millions) of emails designed to trick recipients into giving away money, personal information, or other valuables. Phishing was one of the earliest cyberattacks based on […]

Read More

Tessian phishing emails

Tessian Report: Top Malicious Email Phishing Techniques Used By Cybercriminals

Tessian report reveals two million malicious emails bypassed email defenses and the most common phishing techniques used by cybercriminals.

September 22, 2021 Alyssa Borelli Leave a Comment

Tessian report reveals two million malicious emails bypassed email defenses and the most common phishing techniques used by cybercriminals.

Read More

Hackers use morse code to evade detection

Hackers Used Morse Code In This Phishing Attack

Hackers' are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

August 18, 2021 Alyssa Borelli Leave a Comment

Hackers’ are becoming more sophisticated by using Morse code to evade detection in latest XLS.HTML phishing attack.

Read More

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Interim pages omitted …
  • Go to page 32
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Terms of Use
  • Privacy Policy
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!

© 2022 Emerald X, LLC. All rights reserved.