Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.
A new Mac malware has appeared, targeting mostly German users through a phishing email scheme and aiming to collect private, encrypted communications.
With new cognitive enhancements, IBM Trusteer Rapport can help financial institutions protect their customers from phishing attacks.
IBM X-Force researchers discovered that the volume of spam email campaigns carrying tax fraud scams rises sharply during the months surrounding tax season.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.
Powered by machine learning, IBM Trusteer can help IT professionals nip phishing attacks in the bud with unprecedented speed and accuracy.
According to the upcoming IBM X-Force Threat Intelligence Index, the creation of new TLDs is generating new ways for fraudsters to distribute spam.