A new Defray ransomware variant attacks specific verticals in two separate campaigns: health care and education, and manufacturing and technology.
By integrating phishing intelligence with an SIEM solution, security analysts can proactively monitor APTs and manage risks related to phishing attacks.
According to recent IBM X-Force data, spammers and spam botnets typically work the same hours we do to maximize their returns.
To protect their users from spam and phishing attacks, security professionals should adopt a basic, layered approach to email security.
In July, the global spam rate reached the highest level researchers had observed since March 2015, likely due to a rise in self-spreading email malware.
A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
Is a phishing attack really so advanced? New research suggested that threat actors are lazy and reckless, giving users a chance to shake the hook.
Security leaders must defend sensitive enterprise information from both external actors and negligent insiders who might accidentally cause a data breach.
Cybercriminals are changing their tactics when it comes to phishing attacks, shifting their efforts from hacked web servers to malicious domains.
To protect their WordPress sites from scammers, administrators must proactively patch and monitor their installations to weed out unwanted content.