Articles in « Spear Phishing »

Announcing Spear Phishing Typologies Detection in Vade Secure for Microsoft 365

Announcing Spear Phishing Typologies Detection in Vade Secure for Microsoft 365

calendar

March 19, 2021

New in Vade Secure for Microsoft 365, our spear phishing engine now classifies spear phishing emails according to threat typology. This latest update to our spear phishing technology features a combination of Natural Language Proc[...]
BEC: The Impact of Foreign Languages on English-First Algorithms

BEC: The Impact of Foreign Languages on English-First Algorithms

calendar

January 07, 2021

Unlike other types of email threats, BEC (business email compromise) emails typically feature only a few lines of text, with no URLs, attached files, or other scannable elements. As a result, email security vendors have turned to [...]
email-spoofing

Defending against email spoofing

calendar

November 05, 2020

Email spoofing is a technique for forging an email header to trick recipients into believing a sender is a familiar brand or acquaintance. It’s a critical element of both phishing and spear phishing attacks that can be extremely d[...]

Business Email Compromise: An Old Threat Finds New Targets

calendar

July 16, 2020

Business Email Compromise or BEC presents a radically more sophisticated version of the age-old “Nigerian Prince” scam. According to the FBI, US businesses lost $1.7 billion from business email compromise in 2019. This figure repr[...]
CEO Fraud

Top Tricks Used in CEO Fraud

calendar

July 09, 2020

CEO fraud is a type of spear phishing attack in which a hacker impersonates a CEO via email and persuades a victim to perform a transaction, typically financial. One of the costliest email attacks, CEO fraud is a form of business [...]

Pretexting: 5 Examples of Social Engineering Tactics

calendar

June 04, 2020

Pretexting is a form of social engineering used to manipulate victims into divulging sensitive information. Hackers often research their victims in advance of their first conversation. This gives the hacker a sense of the victim’s[...]

Subscribe to our alerts for our latest blog posts