Recent Posts

Recent Blog Posts

The PhishLabs Blog

Final Review: How to Spot a Phish Video Series

Posted by Lindsey Havens on Oct 31, '17

In observance of National Cyber Security Awareness month, we released several videos to help employees and consumers spot a phish. In the final video, we take a look at a number of phish to apply what we have learned. To view all videos released in this series, visit this page: https://info.phishlabs.com/2017-cyber-security-awareness-month

Read More

Topics: Cyber Security Awareness Month, CyberAware

URL Analysis: How to Spot a Phish Video

Posted by Nicole Garrigan on Oct 24, '17

In observance of National Cyber Security Awareness month, we are releasing several videos to help employees and consumers spot a phish. In the third video, we discuss hovering over a link in a email to analyze the URL before clicking. To view all videos released in this series, visit this page: https://info.phishlabs.com/2017-cyber-security-awareness-month

Read More

Topics: Cyber Security Awareness Month, CyberAware

Email Sender Domain: How to Spot a Phish Video

Posted by Lindsey Havens on Oct 18, '17

In observance of National Cyber Security Awareness month, we are releasing several videos to help employees and consumers spot a phish. In the second video, we take a look at the  sender's email address to help spot a potentially malicious email. To view all videos released in this series, visit this page: https://info.phishlabs.com/2017-cyber-security-awareness-month

Read More

Topics: Cyber Security Awareness Month, CyberAware

How to Spot a Phish Video: Spotting Red Flags

Posted by Lindsey Havens on Oct 9, '17

In observance of National Cyber Security Awareness month, we are releasing several videos to help employees and consumers spot a phish. In this first video, we are going to look at red flags that would identify an email as unsafe. 

Read More

Topics: Cyber Security Awareness Month, CyberAware

Ransomware: How to Spot a Phish


Phishing has no limits. Everyone that uses email to communicate will at some point be the recipient of a phishing email. In the spot a phish series we'll be taking a closer look at some phishing lures to help you mentally prepare for these attacks before they hit your inbox. 

Content Clues

The first lure is representative of a vast majority of lures that we see. For starters, it capitalizes on the universal language of money. Because this is a mass distributed phish, the threat actor needs to find a commonality among the recipients.  For this reason, we see the use of "invoice attachments" employed exhaustively.  Lures in all languages utilize this tactic.  One would think this practice would get old and at some point become ineffective but it must be producing results for cybercriminals; otherwise, why would they keep it up?

Read More

Topics: Cyber Security Awareness Month, CyberAware

   

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Upcoming Events

Calendar_Mock_

Posts by Topic

see all