Today, most IT professionals understand that it’s impossible to stop every attack. That’s led to a...

Today, most IT professionals understand that it’s impossible to stop every attack. That’s led to a...
Identifying phishing attacks is a complex and nuanced endeavor. Attackers use a variety of techniques to disguise their intent or coerce compliance, but every well-crafted phishing attempt includes two key components: social engineering and the payload.
It’s here! The 2019 Verizon Data Breach Investigations Report, released yesterday analyzed 41,686...
Today’s cybercriminals are relying more heavily on executive and brand impersonations to reach...
On April 11, GreatHorn’s threat response team identified a widespread credential theft...
In recent months, we’ve seen a rise in volumetric phishing attacks that lack the consistency...
There is a new round of emails seen in the wild where attackers are attempting to steal...