phishing
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Factors influencing IT security spending
Security executives are overwhelmingly craving more AI solutions in 2023 to help them battle the growing cybersecurity threat landscape, according to Netrix Global. 22% of …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102623/skull-400x200.jpg)
Qakbot: The trojan that just won’t go away
Qakbot (aka Qbot) – banking malware-turned-malware/ransomware distribution network – has been first observed in 2007 and is active to this day. The neverending …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2017/05/09104337/skull-400x200.jpg)
Cybercriminals use legitimate websites to obfuscate malicious payloads
According to Egress, the evolving attack methodologies currently used by cybercriminals are designed to get through traditional perimeter security. “The evolution of phishing …
![phishing kits](https://img.helpnetsecurity.com/wp-content/uploads/2022/02/04123813/phishing-kits-1600-hns-400x200.jpg)
Phishing campaigns thrive as evasive tactics outsmart conventional detection
A 25% increase in the use of phishing kits has been recorded in 2022, according to Group-IB. The key phishing trends observed are the increasing use of access control and …
![laptop](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/21140811/laptop-biohazard-400x200.jpg)
How APTs target SMBs
Small and medium businesses (SMBs) are not exempt from being targeted by advanced persistent threat (APT) actors, according to Proofpoint researchers. By analyzing a year’s …
![malware](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/02135403/malware-400x200.jpg)
Company size doesn’t matter when it comes to cyberattacks
65% of organizations in the enterprise sector suffered a cyberattack within the last 12 months, which is similar to the results among companies of all sizes (68%), according …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/26063958/microsoft365-net-400x200.jpg)
Phishers use encrypted file attachments to steal Microsoft 365 account credentials
Phishers are using encrypted restricted-permission messages (.rpmsg) attached in phishing emails to steal Microsoft 365 account credentials. “[The campaigns] are low …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102741/phishing-400x200.jpg)
Threat actors exploit new channels for advanced phishing attacks
Perception Point’s team has identified a 356% increase in the number of advanced phishing attacks attempted by threat actors in 2022. Overall, the total number of …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Cybercriminals masquerading as MFA vendors
Cybercriminals are increasingly posing as multi-factor authentication vendors and small businesses are becoming more popular targets, according to VIPRE. Attachment-based …
![ChatGPT](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/04123006/chatgpt-danger-400x200.jpg)
Phishing campaign targets ChatGPT users
A clever phishing campaign aimed at stealing users’ business email account credentials by impersonating OpenAI, the company behind the ChatGPT chatbot, has been spotted …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/09161031/microsoft365-2-400x200.jpg)
Greatness phishing-as-a-service threatens Microsoft 365 users
Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new …
![criminal](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113635/criminal-400x200.png)
Think your data has no value? Scammers disagree
In the first quarter of 2023 there was a significant increase in cyberattacks exploiting trust in established tech brands Microsoft and Adobe, according to Avast. The Avast …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD