New phishing technique discovered that abuses Microsoft Office 365's add-in feature. Threat actor then gains full control of everything, including files.
As Phishing attacks get more sophisticated on the social engineering front, so to does the technology and techniques behind keeping them online longer.
As the coronavirus becomes a global pandemic, threat actors have begun abusing the fear surrounding it. One lure we have spotted even mimics the CDC.
This active campaign combines a variety of techniques with a non-text-based email body in order to evade email security technologies.
An ongoing phishing campaign has been observed targeting the administrative accounts that manage Microsoft Office 365. Here's what you need to know.
The new spear phishing campaign is targeting Office 365 credentials of high-value targets.
Threat actors can and will abuse the largest social media sites; but what about blogs, forums, and even gripe sites? Those too can be phishing risks.
When it comes to impersonating employees for phishing attacks, CEOs and executives are most at risk.