 
			
		New phishing scam lures users with fake HR policy updates
A curious case of spear-phishing email techniques employed on a mass scale.
11 articles
 
			
		A curious case of spear-phishing email techniques employed on a mass scale.
 
			
		Cybercriminals prey on corporate credentials by sending phishing links through Dropbox after priming the victim.
 
			
		Attackers invite employees to complete fake self-evaluations to steal corporate credentials.
 
			
		The geopolitical conflict in Ukraine is the latest example of malicious actors trying to cash in on unsuspecting victims.
 
			
		Why using a corporate mail account for personal matters is not a good idea
 
			
		Phishing and business e-mail compromise attacks rely on fake e-mails. But why is it so easy for attackers to make them so convincing?
 
			
		One explanation of phishing success lies in a known psychological effect.
 
			
		 
			
		The Chinese-language Naikon advanced persistent threat group is targeting military, government and civil organizations located in and around the South China Sea, which is an increasingly contentious hot-bed of territorial
 
			
		CozyDuke APT is hitting high-profile targets, including the US government office. Initial penetration method is based entirely on social engineering techniques.