New data from Check Point has found Microsoft remained the most spoofed brand in phishing attacks during the final three ...
Microsoft has witnessed a surge in the use of this tactic since May 2025, as part of opportunistic campaigns targeting organizations across multiple industries and verticals.
Threat actors abuse complex routing and misconfigured protections to spoof domains and send phishing emails that appear to be internal.
ConsentFix is an OAuth phishing technique abusing browser-based authorization flows to hijack Microsoft accounts. Push ...
While most business leaders know what phishing is, many don't understand how common and effective these attacks can be. According to Statista, more than half of companies worldwide have suffered from ...
The cybersecurity refrain when encountering phishing emails invariably advises: “don’t click on that link” and “report that email” — but new research from Drexel University and Arizona State ...
Go phish: Why the sudden rise in phishing attacks? In the fourth quarter of 2024, the Acronis Threat Research Unit detected a sharp jump in the number of phishing attacks — 194% over the previous year ...
So, when an attacker sends a fake UCPath payroll notification with a QR code linking to a credential harvesting site, a SEG ...
Holding large sums of cryptocurrency, crypto whales attract cybercriminals who launch sophisticated phishing attacks to exploit them. These attacks often use fake websites, emails, and impersonation, ...
Cybercriminals are increasingly targeting online account credentials, with 88.5% of phishing scams focused on stealing login ...
Companies have lost more than $12 billion to spear phishing and account takeover, according to Barracuda Networks. “And those numbers obviously don’t include anything that doesn’t get recorded,” said ...
As technology develops, more doors unfortunately open for different kinds of cyberattacks and new types of malicious digital activity. One example is phishing, where perpetrators try to trick people ...