Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

Anatomy of a Phishing Attack: Stolen Microsoft 365 Credentials

Phishing attacks designed to steal Microsoft 365 credentials are launched every day and growing more sophisticated. We recently detected a massive attack that hid a fake Microsoft 365 login page in the incoming emails’ attachments. Related: Microsoft 365 Is Wildly Successful and Profoundly Vulnerable – Here’s Why The attack On

Read More >

PEMPEMPEM – Hiding Behind Fake Certificates!

Over the years, enterprise security teams and threat actors have been involved in a never-ending game of cat and mouse. Organizations pour millions of dollars to stop advanced threats, but threat actors continue finding ways to evade detection by either enhancing their code or simply repackaging malware in more ways

Read More >

Microsoft Finally Acknowledges COVID-19-Related Cybercrimes

On July 7, Microsoft revealed they’ve been working since December 2019 to wrest control of key domains used in vast cyber attacks in 62 countries. This particular phishing scheme used COVID-19-related lures to defraud Microsoft 365 customers. It’s one of many attacks we’ve seen. With tensions high and IT resources

Read More >

Spear Phishing, Whaling, and Delayed Detonation, Oh My!

Companies worldwide are up against sophisticated email attacks like Business Email Compromises (BEC). These attacks are also known as spear phishing, impersonation, and whaling, with the goal of convincing an end-user to release money or provide account information. Related: Microsoft 365 Is Wildly Successful and Profoundly Vulnerable – Here’s Why

Read More >

How Machine Learning Is Building a Better Spam Trap

Bad actors are constantly raising the ante on email scams. According to Microsoft, “phishers have been quietly retaliating, evolving their techniques to try and evade protections. In 2019, we saw phishing attacks reach new levels of creativity and sophistication.” To keep pace with these evasive attacks, threat protection software has

Read More >