by Ron Samson | | Threat Insight
What is a malicious attachment? Malicious attachments typically come along with phishing emails. They may come in the form of a fake invoice, or word doc and contain threats like ransomware, malware, keyloggers and other threats. How do I identify a malicious email...
by Ron Samson | | Threat Insight
What is a malicious URL? A malicious URL is a link created with the purpose of promoting scams, attacks, and frauds. When clicked on, malicious URLs can download ransomware, lead to phishing or spearphishing emails, or cause other forms of cybercrime. Malicious URLs...
by Ron Samson | | Threat Insight
What is phishing? Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices. What types of phishing are there? Spear phishing –...
by Ron Samson | | Email Security
What is email phishing? Email phishing is one of the biggest digital threats of the 21st century. Simply put, a phishing event is when someone attempts to get sensitive information by pretending to be someone or something trustworthy through email. Often, phishing...
by Ron Samson | | Email Security
Business Email Compromise Business Email Compromise (BEC) is a fancy new name for an old technique: the confidence game. And it’s a really lucrative and popular way to commit cybercrime. More than 22,000 targeted organizations in the past 3 years More than $3 billion...