phishing
![Immanuel Chavoya](https://img.helpnetsecurity.com/wp-content/uploads/2022/10/06115747/immanuel_chavoya-2-sonic_wall-400x200.jpg)
Cybercriminals are having it easy with phishing-as-a-service
In this interview for Help Net Security, Immanuel Chavoya, Threat Detection Expert at SonicWall, talks about phishing-as-a-service (PaaS), the risks it can pose to …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Phishing activity exploded in Q2 2022
The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for phishing that …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142333/phishing_red-hns2-400x200.jpg)
Phishing attacks skyrocketing, over 1 million observed
The APWG’s Phishing Activity Trends Report reveals that in the second quarter of 2022, the APWG observed 1,097,811 total phishing attacks — the worst quarter for …
![Revolut](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/20102745/revolut-400x200.jpg)
Revolut data breach: 50,000+ users affected
Revolut, the fintech company behing the popular banking app of the same name, has suffered a data breach, which has been followed by phishing attacks aimed at taking advantage …
![100 dollars](https://img.helpnetsecurity.com/wp-content/uploads/2018/03/09101622/100dollars-400x200.jpg)
SMBs are hardest-hit by ransomware
Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, …
![](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09103910/facebook-icon-400x200.jpg)
Phishers take aim at Facebook page owners
Phishers are looking to trick owners of Facebook pages with fake notices from the social network (i.e., Meta, the company behind Facebook, Instagram and WhatsApp), in an …
![social media](https://img.helpnetsecurity.com/wp-content/uploads/2022/09/14094140/social_media_like-400x200.jpg)
Thwarting attackers in their favorite new playground: Social media
For years, LinkedIn has been utilized by threat actors looking to refine their attacks. From simple spear-phishing attacks to reconnaissance, the professional networking site …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/10142332/phishing_green-hns1-400x200.jpg)
Criminals harvest users’ PI by impersonating popular brands
Hornetsecurity released an Email Threat Review, which cited a decline in Excel attacks, but reported a sharp increase in Intuit phishing attacks. This Help Net Security video …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104216/phishing-400x200.jpg)
EvilProxy phishing-as-a-service with MFA bypass emerged on the dark web
Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
0ktapus: Twilio, Cloudflare phishers targeted 130+ organizations
Group-IB has discovered that the recently disclosed phishing attacks on the employees of Twilio and Cloudflare were part of the massive phishing campaign that resulted in …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/31190026/ransomware-keyboard-400x200.jpg)
Ransomware dominates the threat landscape
Acronis researchers have concluded that ransomware continues to be the number one threat to large and medium-sized businesses, including government organizations. Nearly half …
![Fire](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094044/fire-400x200.jpg)
New social engineering tactics discovered in the wild
In this Help Net Security video, Otavio Freire, President and CTO at SafeGuard Cyber, offers insight on new social engineering tactics discovered in the wild, and illustrates …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD