Estimated Reading Time: 3 minutes The emerging cybercrime trend of diversifying attack targets demonstrates how criminals are increasingly able to detect and exploit new vulnerabilities.
Estimated Reading Time: 2 minutes Phishing attacks increasingly focus on people because the human layer is easily exploited. Here are 3 ways to fortify your defenses against phishing.
Estimated Reading Time: 2 minutes Read the top actionable steps you can take to combat phishing attacks. Cybersecurity Awareness Month is the perfect time to take action with 3 key things you can start doing right now.
Estimated Reading Time: 5 minutes The adoption of single-use phishing URLs is driving new demand for zero-second detections to keep up with the dwindling lifespan of phishing sites.
Estimated Reading Time: 2 minutes We’re excited to announce our latest malicious detection data service, PhishBlocklist™. Powered by our newly launched “Angler” Phishing Detection System, PhishBlocklist is designed to provide the industry’s most advanced and effective source for active and emerging phishing URLs—including zero-hour threats that APWG, Phishtank, and other services haven’t detected.Details
Estimated Reading Time: 13 minutes 2018 was a wild year for cybersecurity, ad tech, and the internet in general. In this blog, we explore the significant trends and security challenges that are likely to impact us in 2019 and beyond.
Estimated Reading Time: 11 minutes Over the past several years, there’s been a significant increase in mobile phishing attacks—particularly targeting enterprises. In this blog, we cover 9 tips and strategies to improve your security against mobile phishing attacks.
Estimated Reading Time: 5 minutes Over the years, cybercriminals have deployed increasingly sophisticated scams to deceive users of payment processing systems—particularly small and medium sized business owners—into compromising their accounts by unknowingly divulging account credentials. Here’s an example of a recent phishing campaign from Fall 2018 targeting Stripe users.
Estimated Reading Time: 17 minutes We’ve put together this glossary of cyber threat definitions as a resource for you in your quest to help make the internet a safer place for all!
Estimated Reading Time: 3 minutes I received an email seemingly from PayPal informing me that access to my account has been limited. It threw me off because I received this at my work email, which is not registered with PayPal. I immediately wondered if my account got hacked.