RansomwareCybercriminals are targeting government, healthcare, and education organizations with ransomware. While an uptick in attacks was expected…Dec 3, 2020Dec 3, 2020
Email threat types: Data exfiltrationData exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices…Nov 26, 2020Nov 26, 2020
Email threat types: MalwareEmail attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment…Nov 19, 2020Nov 19, 2020
Email threat types: SpamSpam is unsolicited bulk email messages, also known as junk email. Spammers typically send an email to millions of addresses, with the…Nov 11, 2020Nov 11, 2020
Email threat types: Domain ImpersonationDomain impersonation, also known as typo squatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate…Nov 5, 2020Nov 5, 2020
Email threat types: Lateral phishingA recent study revealed that 1 in 7 organizations has experienced a lateral phishing attack. In this type of attack, criminals use…Oct 22, 2020Oct 22, 2020
Email threat types: ExtortionExtortion and sextortion attacks are increasing in frequency and sophistication. The criminal contacts potential victims by email and…Oct 15, 2020Oct 15, 2020
Email threat types: URL phishingA URL phishing attack is an attempt to obtain sensitive information such as usernames, passwords, and other details. In this type of…Oct 8, 2020Oct 8, 2020
Email threat types: Account takeoverAccount takeover, also known as an ATO or an account compromise attack, is a type of identity theft where criminals gain access to a…Oct 1, 2020Oct 1, 2020
Email threat types: Brand impersonationBrand impersonation is an attack that impersonates a company or brand to hide the malicious intent of an email. The idea behind it is that…Sep 24, 2020Sep 24, 2020