SMS phishing is way too easy
| | | | | | | | | | | | | | | | | | | | |

SMS phishing is way too easy

Can you guess which one of these is fake? Of course not, they’re identical. How about these? If you paid close enough attention to the second message, … See all articles in Insights

Cloud Email Threats Soar 101% in a Year
| | | | | | | | | | | | | | | | | | | | |

Cloud Email Threats Soar 101% in a Year

The number of email-borne cyber-threats blocked by Trend Micro surged by triple digits last year, highlighting the continued risk from conventional … See all articles in Insights

Scam alert: This subject line is the most obvious sign an email is fraudulent, study reveals
| | | | | | | | | | | | | | | | | | | | |

Scam alert: This subject line is the most obvious sign an email is fraudulent, study reveals

If an unfamiliar email shows up in your inbox with an empty subject line, there’s a likely chance that it’s from a scammer. Malicious emails from … See all articles in Insights

This simple cyberattack is still among the most effective
| | | | | | | | | | | | | | | | | | | | |

This simple cyberattack is still among the most effective

Cybercriminals may be getting more sophisticated by the day, but simple HTML file distribution still remains one of the most popular tactics, new … See all articles in Insights

Your digital footprints could help hackers infiltrate computer networks
| | | | | | | | | | | | | | | | | | | | | |

Your digital footprints could help hackers infiltrate computer networks

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video. This data is collected, … See all articles in Insights

Report: One in four employees who made security mistakes lost their job
| | | | | | | | | | | | | | | | | | | | | |

Report: One in four employees who made security mistakes lost their job

One in four employees lost their job after making a mistake that compromised their company’s security, according to new research from email security company Tessian. The second edition of the report provides an updated look at the factors causing employees to make security mistakes at work, and the … See all articles in Insights

“Browser in the Browser” attacks: A devastating new phishing technique arises
| | | | | | | | | | | | | | | | | | | | |

“Browser in the Browser” attacks: A devastating new phishing technique arises

Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. See all articles in Insights

Cybercriminals are scheduling fake meetings in people’s calendars – here’s why
| | | | | | | | | | | | | | | | | | | | |

Cybercriminals are scheduling fake meetings in people’s calendars – here’s why

If you receive a calendar invite to view new fax documents, be careful – it’s most likely a phishing attack, attempting to obtain your identity and … See all articles in Insights

The vast majority of cyberattacks start with just an email
| | | | | | | | | | | | | | | | | | | | |

The vast majority of cyberattacks start with just an email

Around three-quarters (75%) of all cyberattacks start with a simple email message, a new report from Trend Micro has warned. To tackle the problem, … See all articles in Insights

Hackers Target Microsoft Teams Users in Chats | Cyware Hacker News
| | | | | | | | | | | | | | | | | | | | |

Hackers Target Microsoft Teams Users in Chats | Cyware Hacker News

Cybercriminals are abusing Microsoft Teams by attaching malicious executables to the conversations, in an attempt to spread them among participants. … See all articles in Insights