New Microsoft Scam Emails Bring Brand Impersonation Risk into Focus
A new Microsoft scam may be landing in an inbox near you. Here’s how to suss out fakes and stay out of trouble when handling branded email.
Read the Blog PostA new Microsoft scam may be landing in an inbox near you. Here’s how to suss out fakes and stay out of trouble when handling branded email.
Read the Blog PostEmployees handle PDFs & Office files all day. But can they spot the difference between a real PDF & phishing? See why you need Graphus.
Read the Blog PostThese 10 facts about social engineering illustrate the danger that this cybercrime technique presents to your business.
Read the Blog PostThese 3 growing phishing threats are endangering your company’s security, and they may not be anything that you’re expecting.
Read the Blog PostReady to take it to the next level and transform from a Security Padawan into an Antiphishing Jedi? Graphus is here to help!
Read the Blog PostTo err is human – and the number one cause of cybersecurity disasters is human error. Even employees that are trained in phishing resistance can still be fooled by a well-crafted social engineering attack, unleashing a devastating disaster on your business. Is AI the answer to eliminating that vulnerability and creating a better phishing defense? […]
Read the Blog PostA 2016 survey by Information Security Media Group found that 60% of businesses suspected they were targets of social engineering attacks in the previous 12 months. Of those companies, 65% confirmed that employee credentials were compromised as a result of the incidents. Another 61% of companies reported that spear phishing was “one of the most […]
Read the Blog PostThe FBI believes that the massive Yahoo! breach started with either a social engineering or spear phishing attack on privileged users according to Ars Technica. “Malcom Palmore, the FBI special agent in charge of the bureau’s Silicon Valley office, told Ars in an interview that the initial breach that led to the exposure of a […]
Read the Blog PostPeople are your weakest link. That is what the data tell us about cybersecurity risk today. Every day there are more great tools to protect your network, endpoints and applications. Still others expose threat intelligence, more accurately report intrusion attempts and even identify nefarious behavior by insiders. Cyber criminals know this and are fueling the […]
Read the Blog PostThere are many differences between phishing, spear phishing and social engineering attacks, but they are often used interchangeably and incorrectly. That creates some confusion when people are describing attacks and planning for defense. Understanding these attack types is important. Download: Spear Phishing White Paper In our review of the 5 Agonies of Cyber Attacks, we […]
Read the Blog Post