Spam vs Phish: The Problem with User-Reported Phish Buttons
Phishing for Google Impersonation Attacks
Bad actors around the globe go phishing in emails twenty-four hours a day, seven days a week....
Phishing Phails: When Cybercriminals Don’t Get It “Right”
At GreatHorn, we spend most of our time and effort on the most sophisticated email attacks that...
What Are the 3 Phases of the Phishing Attack Kill Chain?
One of the primary concerns of cyber security leaders within organizations is phishing attacks....
Why Organizations Must Develop a Plan to Combat the Phishing Attack Kill Chain
If you have been in cyber security for any length of time, it is likely that you have heard about...
Wrap-Up: Preventing Phishing Scams in the New Perimeter-Less World
In Case You Missed It Paul Asadoorian, Matt Alderman and Kevin O’Brien discuss how phishing scams...
4 Phishing Scams You Need to Beware of This Holiday Season
With the holiday season just around the corner, it appears that online retailers will be the “go...
The Future of Sporting Events and Spear Phishing Attacks
The Coronavirus pandemic has changed several parts of the sports world, from canceling games to...
New Report Finds Email Users Failing Phishing Test
Can you accurately detect a phishing email when you receive one? That is the question GreatHorn...