According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.
While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.
Microsoft Windows Defender Research discovered an attack campaign that utilized spear phishing emails impersonating U.S. Department of State employees to gain remote access to victims' machines.
Analysts discovered a new spear phishing attack campaign from the SNAKEMACKEREL group that uses fake Brexit-related documents to infiltrate major government agencies and steal information.
A PDF attack campaign conducted by the Cobalt Gang used a specially crafted document to evade dection by static analysis tools.
Researchers believe that a new APT group known as GreyEnergy, which they observed targeting ICS consoles across Poland and Ukraine, may be a successor to BlackEnergy, the group that authored NotPetya.
A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
The OilRig threat group recently targeted government offices in the Middle East with a spear phishing attack that involved the Trojan malware BONDUPDATER.
Business email compromise scams are still surprisingly lucrative. In fact, the volume and frequency of BEC attacks have skyrocketed in recent years, according to FBI data.
A new report revealed that 60 percent of targeted email attacks were aimed at individual contributors and lower-level management between April and June 2018.