This week we are putting our brand new marketing team member, Rachel, to the task of hopefully getting us to our first perfect streak. And because she’s new to the team we decided to bring back our classic format.
Sending a simulated phishing attack is now more accessible than ever thanks to a recent update from Microsoft and the various other free offerings, and many organizations have been pushing them out for years.
Be it once a year, once a quarter, or once a month, these simulated phishing attacks both create awareness for your users and provide valuable feedback to an organization’s security team. However, can simulations on their own be a replacement for training? No. Nein. Non. Nah.
Welcome back to another episode of Is it a Phish? With today being Star Wars Day (May 4), we have decided to spice this up just a little bit by adding in a special themed lure in just for Sandy. Ah spoilers, it looks like you’re getting one freebie this week.
Today we are excited to announce the release of PhishLab’s annual Phishing Trends and Intelligence (PTI) Report. This year’s report provides first-hand, in-depth data and analysis of the events and trends currently shaping the cybersecurity threat landscape.
As with past PTI reports, the goal of the information within is to provide the context and perspective needed to understand why changes are happening and how to better defend against rising threats.
As you are aware, phishing is certainly not a new cyber threat, yet it continues to be one of the most pervasive and costly to businesses and consumers. With nearly endless examples, we have decided to develop a new series that not only highlights some of these attacks, but also sharing helpful tips along the way for spotting them.
It should not be a surprise, but 95 percent of breaches come through phishing attacks. Nothing more than a simple lure email lands in one of your users inboxes, they click it, and everything unravels from there.
Can a single word create broad-sweeping implications to how we use the internet? It most certainly can, and an upcoming software update to Google Chrome may drive a false sense of security while shaming other sites all due to a single word: Secure.
Have you ever wondered what happens after a phish gets reported? Does it simply fall into a blackhole? That’s what PhishLabs set out to answer during this month’s webinar.
As you are likely aware, 95 percent of data breaches, an event that occurs on a daily basis, are the direct result of phishing attacks. For as old as phishing is, it continues to be a cyber security threat because it continues to be effective and technology alone can’t combat email attacks. This is not to mention the rise in other phishing attempts through the likes of social media, messengers, and even gaming systems.
The push for more widespread adoption of HTTPS has been in full-force this year as a way to increase the number of websites that securely transmit information on the Internet. In January, both Chrome and Firefox browsers began alerting users whenever sensitive information, such as passwords or credit card information, was entered on a non-HTTPS web page. In October, Google took this a step further by displaying a “Not Secure” label in the URL bar whenever a user enters any text on an HTTP website.
Today, we are going to look at a phish that takes advantage of the massive user base of Office 365 products. It’s safe to speculate that this phish is specifically targeting enterprise employees given most users of Office 365 products are using it for business purposes.