New FishXProxy Phishing Kit

New FishXProxy Phishing Kit Lowers Barriers for Cybercriminals

Imagine receiving an email that looks perfectly legitimate, down to the last detail. This is the deceptive power of new FishXProxy Phishing Kit, a new phishing toolkit emerging from the cybercrime underground ...
resolutions cybersecurity password phishing

Google and Apple Move to Strengthen User Protections

Google and Apple look to give users better protections against social engineering attacks like phishing, with Google giving high-risk users access to the APP service with a passkey and Apple educating users ...
Security Boulevard
What is Brand Impersonation?

What is Brand Impersonation?

Brand impersonation (or brand spoofing) is a form of phishing and social engineering in which the fraudster poses as a legitimate brand. A brand impersonation attack leverages consumer trust in the brand ...
Drink Like a Phish

Drink Like a Phish

PHISHING SCHOOLHow to Make Your Phishing Sites Blend InAs you read this, bots are coming to find and destroy your phishing sites. You need to protect them before it’s too late! But how?A phishing ...
MITM, man, ransomware payments

Man-In-The-Middle Attacks are Still a Serious Security Threat

Man-in-the-middle attacks have increased in the age of digital connectivity and remote work, forcing companies to develop strategies to mitigate them ...
Security Boulevard
Like Shooting Phish in a Barrel

Like Shooting Phish in a Barrel

PHISHING SCHOOLBypassing Link CrawlersYou’ve just convinced a target user to click your link. In doing so, you have achieved the critical step in social engineering:Convincing someone to let you in the door!Now, we just ...
Get a demo

Neiman Marcus experiences data breach; FBI issues warning over crypto scam

It may seem difficult to track all of the different cyber scams deployed by bad actors in the digital space. These threats can be entirely new scams developed by cybercriminals, or are ...
campaigns, threat, HEAT, managed detection and response, Apache ActiveMQ, vulnerability, Aqua Cham, threat, elGang APT Meltdown Spectre Threat Detection

Three Nation-State Campaigns Targeting Healthcare, Banking Discovered

Researchers have identified three distinct nation-state campaigns leveraging advanced highly evasive and adaptive threat (HEAT) tactics ...
Security Boulevard
Figure 1 infrastructure

Episode 2: Behind the Scenes of a Tailor-Made Massive Phishing Campaign Part 2

Executive Summary Last summer, we investigated a massive, global phishing campaign impersonating almost 350 legitimate companies. Our continued investigation into this expansive phishing campaign revealed leaked backend source code, shedding light on ...
I Will Make you Phishers of Men

I Will Make you Phishers of Men

PHISHING SCHOOLConvincing Targets to Click Your LinksWhen it comes to phishing advice, the number one question I get from co-workers is “what campaigns are you using?”. People see my success, and wish to ...