![]()
You’ve probably seen them: enticing online offers for free products from brands you trust, like a Yeti beach chair from Costco or an emergency car kit from AAA.
![]()
Below is an example of a sophisticated survey scam phishing email that KnowBe4’s Threat Lab team has been monitoring as discussed in “The Hidden Cost of “Free” Gifts: How Survey Scams Are Evolving to Steal Financial Data”.
![]()
Cybercriminals are increasingly abusing AI-assisted website generators to quickly craft convincing phishing sites, according to researchers at Palo Alto Networks’ Unit 42.
![]()
Attackers are using a Japanese Unicode character to replace forward slashes in phishing URLs, BleepingComputer reports.
![]()
Professional phishing groups are targeting customers of brokerage firms in order to manipulate stock prices, KrebsOnSecurity reports. The attackers use a technique called “ramp and dump” to profit from the scheme.
![]()
Social engineering attacks are a growing threat to operational technology (OT) environments, Industrial Cyber reports.
![]()
In this series, we first explored the psychology that makes HR phishing so effective, then showcased the real-world lures attackers use to trick your employees. Now, we’re going under the hood to answer the critical question: How do these attacks technically bypass security defenses?
![]()