By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
Cybercriminals recently breached two popular cryptocurrency platforms to steal personal information and digital funds to the tune of $300,000.
Since January, cybercriminals have responded to browser security enhancements by increasing their use of HTTPS in phishing sites.
Security researcher Xudong Zheng discovered a vulnerability in several popular web browsers that could enable fraudster to mask phishing attacks.
Barracuda Networks observed a phishing attack that used fraudulent airline tickets to trick victims into volunteering corporate credentials.
Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.
A new phishing report from Google Research makes it clear: Corporate inboxes lure the largest number of phishing and malware attacks.
It is counterproductive to shame phishing victims because it discourages end users from alerting IT professionals of suspicious emails or activity.