Threat actors have taken a liking to IQY files, which are foreign to most users and appear benign to many spam filters.
Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
Nearly Half of Organizations Targeted Again Within a Year of Suffering a ‘Significant’ Cyberattack, Report Reveals
Nearly half of organizations that suffered a "significant" cyberattack fell victim to bad actors again within a year's time, a recent security trends report revealed.
Last month's cybersecurity news cycle featured a tricky cryptocurrency-stealing Trojan, targeted phishing attacks, interesting insights about millennials' identity protection habits and more.
An Interview With IBM Master Inventor James Kozloski on His New Security Patent: The Cognitive Honeypot
An innocent conversation with a colleague at the office printing station led IBM Master Inventor James Kozloski to land a security patent for the cognitive honeypot, a tool to combat spear phishing.
A targeted phishing campaign aimed at Canadian businesses prompts users with high levels of access to divulge login credentials and authentication codes.
Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.
A new spear phishing campaign leverages a series of malicious emails to target and compromise Russian-speaking enterprises via hidden backdoors.
A single breach is all it takes to wreak havoc on a health care organization that relies solely on perimeter controls for critical data protection.
A recent phishing campaign targeted GitHub developers with Dimnie malware, which enables fraudsters to alter open source code packages.