Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices

Author: Kian Buckley Maher  SEG Bypassed: Microsoft  The Cofense Phishing Defense Center (PDC) has noted an increase in the number of malicious emails utilising this attack vector. In an attempt to bypass traditional file and text detection software, QR codes provide threat actors with a different tactic to encode malicious URLs.   While it is possible to open […]

The post Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices appeared first on Cofense.

Continue reading Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices

Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices

Author: Kian Buckley Maher  SEG Bypassed: Microsoft  The Cofense Phishing Defense Center (PDC) has noted an increase in the number of malicious emails utilising this attack vector. In an attempt to bypass traditional file and text detection software, QR codes provide threat actors with a different tactic to encode malicious URLs.   While it is […]

The post Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices appeared first on Cofense.

Continue reading Malicious Actors Utilizing QR Codes to Deploy Phishing Pages to Mobile Devices

Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns

Cofense Intelligence™ Strategic Analysis  By: Max Gannon  Domains hosting malware fall into roughly 3 categories: created, compromised, and abused. Created domains are domains created by a threat actor before a phishing campaign and are used in that campaign to deliver malware. Compromised domains are domains that have had some portion of their resources compromised and […]

The post Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns appeared first on Cofense.

Continue reading Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns

Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns

Cofense Intelligence™ Strategic Analysis By: Max Gannon  Domains hosting malware fall into roughly 3 categories: created, compromised, and abused. Created domains are domains created by a threat actor before a phishing campaign and are used in that campaign to deliver malware. Compromised domains are domains that have had some portion of their resources compromised and used […]

The post Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns appeared first on Cofense.

Continue reading Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns

The Future of Email Security: Why Technology Alone Isn’t Enough

Over the past year, the Cofense Intelligence team saw a whopping 569% increase in malicious phishing emails bypassing standard email security solutions. Just when you thought your email was secure, our insights are telling a much different story. The problem? Many organizations are relying solely on a technology-based solution while threat actors are finding more […]

The post The Future of Email Security: Why Technology Alone Isn’t Enough appeared first on Cofense.

Continue reading The Future of Email Security: Why Technology Alone Isn’t Enough

The Future of Email Security: Why Technology Alone Isn’t Enough

Over the past year, the Cofense Intelligence team saw a whopping 569% increase in malicious phishing emails bypassing standard email security solutions. Just when you thought your email was secure, our insights are telling a much different story. The problem? Many organizations are relying solely on a technology-based solution while threat actors are finding more […]

The post The Future of Email Security: Why Technology Alone Isn’t Enough appeared first on Cofense.

Continue reading The Future of Email Security: Why Technology Alone Isn’t Enough

The Future of Email Security: Why Technology Alone Isn’t Enough

Over the past year, the Cofense Intelligence team saw a whopping 569% increase in malicious phishing emails bypassing standard email security solutions. Just when you thought your email was secure, our insights are telling a much different story. The problem? Many organizations are relying solely on a technology-based solution while threat actors are finding more […]

The post The Future of Email Security: Why Technology Alone Isn’t Enough appeared first on Cofense.

Continue reading The Future of Email Security: Why Technology Alone Isn’t Enough

Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023

As the cybersecurity landscape continues to change, so do the threats organizations need to worry about. With 74% of security decision-makers reporting that their organization’s sensitive data may have been potentially compromised or breached in the last 12 months, it’s pretty apparent no one is immune to cyber-attacks. While ransomware and Business Email Compromise (BEC) […]

The post Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023 appeared first on Cofense.

Continue reading Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023

Xneelo Users Targeted in a Multi-stage Phishing Attack 

Found in Environments Protected by: Mimecast  Author: Olwen Brangan   Cofense Phishing Defense Center  The Cofense Phishing Defense Center discovered a multi-stage phishing campaign targeting customers from Xneelo, a South African web hosting provider who supports over 500,000 customers. Xneelo provides customers with two options of control panels to manage accounts: the Xneelo control panel and […]

The post Xneelo Users Targeted in a Multi-stage Phishing Attack  appeared first on Cofense.

Continue reading Xneelo Users Targeted in a Multi-stage Phishing Attack 

Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023

As the cybersecurity landscape continues to change, so do the threats organizations need to worry about. With 74% of security decision-makers reporting that their organization’s sensitive data may have been potentially compromised or breached in the last 12 months, it’s pretty apparent no one is immune to cyber-attacks. While ransomware and Business Email Compromise (BEC) […]

The post Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023 appeared first on Cofense.

Continue reading Forrester: Ransomware, Business Email Compromise and AI Among Top Cybersecurity Threats in 2023