phishing
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/06/09094128/phishing-400x200.jpg)
Exploiting common URL redirection methods to create effective phishing attacks
“Simple” can often be harder than “complex.” When thinking about the trickiest phishing campaigns and their components, URL redirection does not immediately come to mind as …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/31160326/email-smoke-blue-400x200.jpg)
Email security is a human issue
Research suggests that email is the most common point of entry for malware, providing access in 94% of cases, so it’s unsurprising that phishing is the root cause of 32% of …
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Defeating typosquatters: Staying ahead of phishing and digital fraud
It has become a mantra for businesses targeted by hackers to describe the incident as a “sophisticated cyber-attack”. Although true in some instances, the reality is that most …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/21140811/laptop-biohazard-400x200.jpg)
58% of orgs predict remote workers will expose them to data breach risk
35% of UK IT decision makers admitted that their remote workers have already knowingly put corporate data at risk of a breach in the last year according to an annual survey …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093732/phishing2-400x200.jpg)
Attackers can teach you to defend your organization against phishing
People click on links and attachments and will, unfortunately, keep clicking even if they should know better. They’ll click for the chance of winning a holiday, or even …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Cybercriminals evolving their tactics to exploit collective human interest
Phishing activity increased significantly in the first few months of 2020, taking advantage of pandemic-induced product shortages and increased usage of streaming services, …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
61% of organizations impacted by ransomware in 2020
Enterprises faced unprecedented cybersecurity risk in 2020 from increasing attack volume, the pandemic-driven digital transformation of work, and generally deficient cyber …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/19165017/lock-blue-400x200.jpg)
How micro-segmentation creates an uphill battle for intruders
The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …
![organize](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103202/organize-400x200.jpg)
Outgunned CISOs navigate complex obstacles to keep rising attacks from turning into breaches
CISOs face a rising ‘security debt’ to secure their organizations against an increasing volume of attacks by well-armed criminals. Yet, despite going up against a criminal …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094413/money2-400x200.jpg)
Payment transaction volume using 3-D Secure protocol grows globally
RSA has published its latest quarterly fraud report, reinforcing the migration to more precise payment authentication methods and showing a notable spike in brand abuse …
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092758/office365-3-400x200.jpg)
Office 365 phishing campaign uses publicly hosted JavaScript code
A new phishing campaign targeting Office 365 users cleverly tries to bypass email security protections by combining chunks of HTML code delivered via publicly hosted …
![Google Forms](https://img.helpnetsecurity.com/wp-content/uploads/2021/04/07145043/google_forms-400x200.jpg)
Cybercriminals are using Telegram bots, Google Forms to gather stolen user data
Cybercriminals are increasingly using legitimate services such as Google Forms and Telegram to gather user data stolen on phishing websites. Alternative ways to collect data …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints