Phishing
![New FishXProxy Phishing Kit](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals
Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...
![resolutions cybersecurity password phishing](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Google and Apple Move to Strengthen User Protections
Google and Apple look to give users better protections against social engineering attacks like phishing, with Google giving high-risk users access to the APP service with a passkey and Apple educating users ...
![What is Brand Impersonation?](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
What is Brand Impersonation?
Brand impersonation (or brand spoofing) is a form of phishing and social engineering in which the fraudster poses as a legitimate brand. A brand impersonation attack leverages consumer trust in the brand ...
![Drink Like a Phish](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Drink Like a Phish
PHISHING SCHOOLHow to Make Your Phishing Sites Blend InAs you read this, bots are coming to find and destroy your phishing sites. You need to protect them before it’s too late! But how?A phishing ...
![MITM, man, ransomware payments](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Man-In-The-Middle Attacks are Still a Serious Security Threat
Man-in-the-middle attacks have increased in the age of digital connectivity and remote work, forcing companies to develop strategies to mitigate them ...
![Like Shooting Phish in a Barrel](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Like Shooting Phish in a Barrel
PHISHING SCHOOLBypassing Link CrawlersYou’ve just convinced a target user to click your link. In doing so, you have achieved the critical step in social engineering:Convincing someone to let you in the door!Now, we just ...
![Get a demo](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Neiman Marcus experiences data breach; FBI issues warning over crypto scam
It may seem difficult to track all of the different cyber scams deployed by bad actors in the digital space. These threats can be entirely new scams developed by cybercriminals, or are ...
![campaigns, threat, HEAT, managed detection and response, Apache ActiveMQ, vulnerability, Aqua Cham, threat, elGang APT Meltdown Spectre Threat Detection](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Three Nation-State Campaigns Targeting Healthcare, Banking Discovered
Researchers have identified three distinct nation-state campaigns leveraging advanced highly evasive and adaptive threat (HEAT) tactics ...
![Figure 1 infrastructure](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Episode 2: Behind the Scenes of a Tailor-Made Massive Phishing Campaign Part 2
Executive Summary Last summer, we investigated a massive, global phishing campaign impersonating almost 350 legitimate companies. Our continued investigation into this expansive phishing campaign revealed leaked backend source code, shedding light on ...
![I Will Make you Phishers of Men](https://cdn.statically.io/img/securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
I Will Make you Phishers of Men
PHISHING SCHOOLConvincing Targets to Click Your LinksWhen it comes to phishing advice, the number one question I get from co-workers is “what campaigns are you using?”. People see my success, and wish to ...