Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What is Spear Phishing: How It Works and How to Stay Safe?

Spear phishing plays a significant role in causing data breaches and cyberattacks. It costs businesses and individuals millions of dollars each year. Spear phishing is different from traditional phishing, which covers a broad spectrum. It targets specific individuals or organizations and uses tricks to make the victim reveal some sensitive information. This article explores spear phishing. It covers its unique traits and offers expert tips to identify and stop such attacks.

Phishing Campaign Targets YouTube Creators

An email phishing campaign is targeting popular YouTube creators with phony collaboration offers, according to researchers at CloudSEK. The emails contain OneDrive links designed to trick users into installing malware. “The malware is hidden within attachments such as Word documents, PDFs, or Excel files, often masquerading as promotional materials, contracts, or business proposals,” the researchers explain.

Must-know phishing statistics for 2025

In 2024, phishing threats have become more sophisticated, with cybercriminals leveraging new methods such as quishing and multi-channel attacks. The growing complexity is evident in recent data, with a rise in incidents reported to the ICO in the UK and a 10% increase in complaints, including phishing/spoofing, filed with the FBI's Internet Crime Complaint Center (IC3) in the US.

Email Bombing: Why You Need to be Concerned

Over the last few months, the topic of email bombing has been brought to our attention multiple times, mostly queries from customers that go something like this: “I have a few users experiencing some sort of spam attack, where they are receiving thousands of random registration or subscription emails. What do I do, and why is it occurring? Help!” This scenario is known as email or subscription bombing.

Enhancing Cybersecurity: Essential Inbound Email Security Strategies for Modern Businesses

As cyber threats continue to evolve, protecting your organization's email communications has never been more critical. From advanced AI-powered filtering to comprehensive staff training, discover the essential strategies that safeguard your business against modern email-based attacks. This guide provides actionable insights to strengthen your security posture and defend against emerging threats targeting your inbox.

[Heads Up] Bad Actors Use Voice Phishing in Microsoft Teams To Spread DarkGate Malware

Threat actors are using voice phishing (vishing) attacks via Microsoft Teams in an attempt to trick victims into installing the DarkGate malware, according to researchers at Trend Micro. “The attacker used social engineering to manipulate the victim to gain access and control over a computer system,” Trend Micro says.

How GenAI Improves Email Threat Detection and Security

The role of generative AI in cybersecurity increases in direct proportion to the use of GenAI models among cybercriminals. Since attackers can now churn out human-like text, manipulate media, and create unrecognizable malware variants on a larger scale, organizations should rethink traditional approaches to email security. Generative AI can help them turn the tables on threat actors by beefing up their defenses against AI-powered email attacks.