Phishing

Phishing
Job hunting can be stressful, and scammers make it even worse. Learn how bad actors use fake job ads to steal your personal information — and your money.

January 29, 2025
Louis Livingston-Garcia
Phishing
A deepfake phishing attack scammed one company out of millions. Learn how to protect your organization from AI spoofing scams.

January 15, 2025
Jeff Peters
Phishing
This article compares the pros and cons of 9 tools that allow you to actually run a phishing campaign on your own.

July 11, 2024
Andrei Antipov
Phishing
BEC scams cost organizations nearly $3 billion last year. See examples of business email compromise and how to prevent it in your organization.

October 07, 2023
Drew Robb
Phishing
See a live demo of a phishing attack using the Social-Engineer Toolkit and learn how cybercriminals are using AI to make them more effective.

March 06, 2023
Bianca Gonzalez
Phishing
You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand. Learn how these extortion attacks work.

February 27, 2023
Bianca Gonzalez
Phishing
Learn how easy it is to create a Zoom phishing email in this episode of Cyber Work Applied with Infosec Principal Security Researcher Keatron Evans.

January 09, 2023
Bianca Gonzalez
Phishing
53% of organizations reported a phishing-related breach. Here are the top phishing email subject lines your employees should be able to recognize.

March 20, 2022
Christine McKenzie
Phishing
What is consent phishing? How are cyberattackers using a standard protocol, OAuth 2.0, to gain access to user data even if it is robustly protected?

November 23, 2021
Susan Morrow
Phishing
What are the trends in business email compromise (BEC) in the next 12 months likely to be? Will deep fakes or crypto be the next big thing in BEC?

September 28, 2021
Susan Morrow- Reduce security events
- Reinforce cyber secure behaviors
- Strengthen cybersecurity culture at your organization
In this Series
- Protect yourself from job search scams: Don't let hackers exploit your job hunt
- Deepfake phishing example: Protect your employees from deepfake scams
- The best 9 phishing simulators for employee security awareness training (2024)
- Keeping your inbox safe: How to prevent business email compromise
- How to set up a phishing attack with the Social-Engineer Toolkit
- Extortion: How attackers double down on threats
- How Zoom is being exploited for phishing attacks
- 11 phishing email subject lines your employees need to recognize [Updated 2022]
- Consent phishing: How attackers abuse OAuth 2.0 permissions to dupe users
- The state of BEC in 2021 (and beyond)
- Why employees keep falling for phishing (and the science to help them)
- Phishing attacks doubled last year, according to Anti-Phishing Working Group
- The Phish Scale: How NIST is quantifying employee phishing risk
- 6 most sophisticated phishing attacks of 2020
- JavaScript obfuscator: Overview and technical overview
- Malicious Excel attachments bypass security controls using .NET library
- Phishing with Google Forms, Firebase and Docs: Detection and prevention
- Phishing domain lawsuits and the Computer Fraud and Abuse Act
- Phishing: Reputational damages
- Spearphishing meets vishing: New multi-step attack targets corporate VPNs
- Phishing attack timeline: 21 hours from target to detection
- Overview of phishing techniques: Brand impersonation
- BEC attacks: A business risk your insurance company is unlikely to cover
- Cybercrime at scale: Dissecting a dark web phishing kit
- Lockphish phishing attack: Capturing android PINs & iPhone passcodes over https
- 4 types of phishing domains you should blacklist right now
- Email attack trend predictions for 2020
- 4 tips for phishing field employees [Updated 2020]
- How to scan email headers for phishing and malicious content
- Should you phish-test your remote workforce?
- Overview of phishing techniques: Fake invoice/bills
- Phishing simulations in 5 easy steps — Free phishing training kit
- Overview of phishing techniques: Urgent/limited supplies
- Overview of phishing techniques: Compromised account
- Phishing techniques: Contest winner scam
- Phishing techniques: Expired password/account
- Overview of Phishing Techniques: Fake Websites
- Overview of phishing techniques: Order/delivery notifications
- Phishing technique: Message from a friend/relative
- [Updated] Top 9 coronavirus phishing scams making the rounds
- Phishing technique: Message from the boss
- Cyber Work podcast: Email attack trend predictions for 2020
- Phishing techniques: Clone phishing
- Phishing attachment hides malicious macros from security tools
- Phishing techniques: Asking for sensitive information via email
- PayPal credential phishing with an even bigger hook
- Your 2020 tax scam training guide
- Abusing email rules
- 8 phishing simulation tips to promote more secure behavior
- Top types of Business Email Compromise [BEC]
- Reduce security events
- Reinforce cyber secure behaviors
- Strengthen cybersecurity culture at your organization