
Received an email with a QR code? Watch out!
Examples of how QR codes in emails are used for phishing.
102 articles
Examples of how QR codes in emails are used for phishing.
Scammers want to steal your passwords and financial data with fake websites. But where do they host them, and how to spot a fake?
Fake websites and email addresses are often used in phishing and targeted attacks. How do fake domains get created, and how to spot one?
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Hackers are distributing the QBot trojan through business correspondence.
Microsoft plans to throttle and block email from vulnerable Exchange servers to Exchange Online.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
We recall the story of the ILOVEYOU worm — one of the most infamous viruses from 22 years ago.
Malicious spam campaign targeting organizations grows 10-fold in a month, spreads Qbot and Emotet malware.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
Methods of reasonable protection against potential freelancer related cyberthreats.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
The malicious Internet Information Services module makes Outlook on the web a cybercriminal tool.
Getting e-mail through a Web interface may be convenient, but attackers are after corporate mailboxes, and one day they may visit yours.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.