Search engine optimization (SEO) is a long game. Improving your website to rank higher on search engine results pages helps you attract more traffic. Plus, it helps build a trustworthy…
Browsing CategoryPhishing Attack
Why Phishing Is Still the Top Attack Method
Attackers are known to pore over a company’s website and social channels. Perhaps they spot a mention of an upcoming charity event. Who runs the charity? What does their email…
What Are the Biggest Phishing Trends Today?
According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger…
Hive0117 Continues Fileless Malware Delivery in Eastern Europe
Through continued research into the ongoing cyber activity throughout Eastern Europe, IBM Security X-Force identified a phishing email campaign by Hive0117, likely a financially motivated cybercriminal group, from February 2022,…
Ransomware Resilience Tops Findings in X-Force Threat Intelligence Index 2022
For the third year in a row, ransomware was the top attack type globally in 2021, despite some successes last year by law enforcement to take down ransomware groups. This…
How to Report Scam Calls and Phishing Attacks
With incidents such as the Colonial Pipeline infection and the Kaseya supply chain attack making so many headlines these days, it can be easy to forget that malicious actors are…
Phishing Attacks Are Top Cyber Crime Threat, Easier Than Ever to Create and Deploy
Why is one of cyber crime’s oldest threats still going strong? The Anti-Phishing Working Group (APWG) reports that January 2021 marked an unprecedented high in the APWG’s records, with over…
How to Protect Against Deepfake Attacks and Extortion
Cybersecurity professionals are already losing sleep over data breaches and how to best protect their employers from attacks. Now they have another nightmare to stress over — how to spot…
Cyberattacks Use Office 365 to Target Supply Chain
Malicious actors have a history of trying to compromise users’ Office 365 accounts. By doing so, they can tunnel into a network and use their access to steal sensitive information.…
How to Avoid Smishing Attacks Targeting Subscription Service Users
If you’re anything like me, you used delivery more during the pandemic than before. Both getting food brought to my door and meal kit boxes mean people don’t have to…