Back to blog

Posts in the category
"Phishing"

Research

Microsoft 365 phishing email: how hackers are using a 20-year-old text trick

In the email security game between hackers and users, adversaries employ various forms of masquerading with a file to...

Phishing

3 Under-Recognized Ways Phishing Attacks Impact Businesses

What comes to mind when you think of the impact of phishing attacks? For most MSPs, SMBs, and other frequent phishing...

Phishing

Phishing Awareness Training: 8 Things Your Employees Should Understand

This article was originally published in 2019 and has been updated with new content.

Not long ago, phishing was...

Phisher's Favorites

Phishers’ Favorites Top 25 H1 2021, Worldwide Edition

Phishers’ Favorites highlights the 25 most impersonated brands in phishing attacks. The list is compiled by analyzing...

Phishing

20 Years After the Love Bug Virus: Too Many Phish in the Sea

Are you my secret admirer? That was the question millions of people were asking 20 years ago when the Love Bug virus...

Phisher's Favorites

A Year Like No Other: Phishers’ Favorite Brands of 2020

COVID-19 helped drive a continuous onslaught of phishing attacks in 2020. From the World Health Organization (WHO) to...

Phishing

After the Phishing Simulation: Filling the Awareness Gap

A phishing simulation is a great way to gauge your users’ cybersecurity awareness. But what happens after the...