
Conversation hijacking and how to deal with it
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Spam Analysis Expert
39 articles
Cybercriminals can access the e-mails of folks you’re in correspondence with and then try to hijack your conversations.
Cybercriminals are using hijacked SharePoint servers to send dangerous notifications.
Korean filmmakers have made a film about cybercrime that deserves a look — if only as a training tool.
Cybercriminals are sending to companies high-quality imitations of business letters with a spy trojan in the attachment.
How cybercriminals extract bank card details pretending to be DHL.
Here’s how phishers extract phone numbers and credentials from users of Wise.
We explain how scammers steal cryptowallets through phishing.
We explain how phishers are swindling Wells Fargo customers out of personal credentials, passwords, card details, and selfies with an ID card.
What is a seed phrase, how scammers use it to steal cryptowallets, and how to protect your MetaMask account.
We reveal more cunning cybercriminal tricks and explain how to guard against scams.
Anti-phishing lessons: what company employees should know about fake notifications about account security.
To be ready for attacks targeting your company, information security officers need to know about received spear-phishing e-mails.
Attackers are trying to steal credentials from corporate mail by sending lists of quarantined spam e-mails.
We look at some examples of LinkedIn phishing and explain how everyone can avoid taking the bait.
Scammers are sending fake transfer receipt notifications to Luno cryptoexchange users and stealing their credentials.
Why using a corporate mail account for personal matters is not a good idea
Received a confirmation e-mail for a purchase you didn’t make with a phone number to contact the company? Beware, it’s vishing.
Spam and phishing e-mails are not the only threats you might find in your mailbox. Cybercriminals are still using good old links to malware.