How business email compromise attacks emulate legitimate web services to lure clicks

New BEC cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe Stock. Threat actors have added a new wrinkle to traditional…

Continue ReadingHow business email compromise attacks emulate legitimate web services to lure clicks

Phishing from threat actor TA473 targets US and NATO officials

These phishing campaigns are exploiting a Zimbra vulnerability and affecting internet-facing webmail services. Learn how to protect your organization from this security threat. Image: ronstik/Adobe Stock A new Proofpoint report…

Continue ReadingPhishing from threat actor TA473 targets US and NATO officials

Humans are still better at creating phishing emails than AI — for now

AI-generated phishing emails, including ones created by ChatGPT, present a potential new threat for security professionals, says Hoxhunt. Image: Gstudio/Adobe Stock Amid all of the buzz around ChatGPT and other…

Continue ReadingHumans are still better at creating phishing emails than AI — for now