
E-mail with a malicious link
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Spam Analysis Expert
40 articles
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.
Scammers are using redirects through Google Apps Script to prevent mail servers from blocking phishing links.
Attackers claiming to represent Adobe online services are sending fake notifications to obtain corporate e-mail credentials.
To bypass text-analysis mechanisms, attackers are distributing phishing letters in images. How to avoid the danger.
Phishers are using Google online services to take over Microsoft online service accounts.
If an incoming message asks you to sign in to your MS Office account, here’s what to do.
With a website that looks like it could represent an online service provider, DarkSide Leaks makes us wonder what cybercriminals’ other PR tricks might be.
Ransomware operators sometimes resort to rather unconventional threats to get their victims to pay.
Scammers are cashing in on the PlayStation 5 shortage. Here’s how to avoid their bait.
Hackers trying to inflict maximum reputation damage are sending out links to the data they stole through Accellion FTA vulnerabilities.
Cybercriminals are sending phishing e-mails to hijack access to ESP accounts.
If you receive a message saying your Facebook account has been blocked for copyright violation, don’t panic. It’s most likely just another phishing scam.
To bypass antiphishing technologies, malefactors can use legitimate e-mail service providers, or ESPs — but dangerous letters aren’t unstoppable.
Cybercriminals are trying to extort money from companies by threatening to bomb their offices.
Cybercriminals have adopted the marketing tool for information collection.
The DMARC mechanism has its drawbacks, but we have developed a technology to fix them.
BEC attacks that use compromised mailboxes are especially dangerous. Here’s how we learned to identify them.