Despite many attempts to heighten email security through user training sessions and simulated...
Phishing Emails, Explained: “Action Required: Mail Sync Error!”
This is the first post in our new blog series, "Phishing Emails, Explained." In this series, we'll...
Combating Phishing with Modern Email Security (Part 2 of 3)
Last week, we discussed the evolution of email threats from nuisance spam to elusive phishing...
Spotting Phishing Attacks With a More Nuanced Approach
Identifying phishing attacks is a complex and nuanced endeavor. Attackers use a variety of techniques to disguise their intent or coerce compliance, but every well-crafted phishing attempt includes two key components: social engineering and the payload.
Executives in the Crosshairs: Phishing Remains Top Tactic
It’s here! The 2019 Verizon Data Breach Investigations Report, released yesterday analyzed 41,686...
Deciphering Look-Alike Domains: A Closer Look at this Exploding Phishing Tactic
Today’s cybercriminals are relying more heavily on executive and brand impersonations to reach...
Volumetric Phishing Attacks Grow Up
In recent months, we’ve seen a rise in volumetric phishing attacks that lack the consistency...
“Terms of Service” Phishing Attack is the Latest to Target O365 Users
There is a new round of emails seen in the wild where attackers are attempting to steal...
Microsoft Sway “Voicemail” Phishing Attack Introduces New Attack Pattern
GreatHorn’s threat research team identified what appears to be a new approach to tricking...
New Phishing Tactic Targets Skype Customers, Mimics Calendar Notification
Between 10:50am-11:00am on January 25th, GreatHorn’s threat response team identified an active,...