Today, most IT professionals understand that it’s impossible to stop every attack. That’s led to a...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
Spotting Phishing Attacks With a More Nuanced Approach
Identifying phishing attacks is a complex and nuanced endeavor. Attackers use a variety of techniques to disguise their intent or coerce compliance, but every well-crafted phishing attempt includes two key components: social engineering and the payload.
Executives in the Crosshairs: Phishing Remains Top Tactic
It’s here! The 2019 Verizon Data Breach Investigations Report, released yesterday analyzed 41,686...
Deciphering Look-Alike Domains: A Closer Look at this Exploding Phishing Tactic
Today’s cybercriminals are relying more heavily on executive and brand impersonations to reach...
Attackers Mimic Email Security Vendor’s Return Path to Steal Office 365 Credentials
On April 11, GreatHorn’s threat response team identified a widespread credential theft...
Volumetric Phishing Attacks Grow Up
In recent months, we’ve seen a rise in volumetric phishing attacks that lack the consistency...
“Terms of Service” Phishing Attack is the Latest to Target O365 Users
There is a new round of emails seen in the wild where attackers are attempting to steal...