How to Fight Blov HTML Crypter Phishing

Blov HTML Crypter: Phishing Evasion Through Encryption and Obfuscation

Cybercriminals are sharpening their phishing tactics with tools like Blov HTML Crypter — a utility that modifies HTML files to evade detection by security scanners. By employing techniques such as minification, encryption, ...
DocuSign impersonation attacks are exploiting government-vendor theft

Government Agency Spoofing: DocuSign Attacks Exploit Government-Vendor Trust

The latest wave of DocuSign attacks has taken a concerning turn, specifically targeting businesses that regularly interact with state, municipal, and licensing authorities. Since November 8 through November 14, we have observed ...
GoIssue specializes in phishing and repository hijacking

GoIssue – The Tool Behind Recent GitHub Phishing Attacks

By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows attackers to extract email addresses from GitHub profiles and send bulk emails directly to ...
URL Rewriting

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security

URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...
URL Rewriting

The Hidden Risks of URL Rewriting and the Superior Alternative for Email Security

URL rewriting, a service designed to neutralize malicious URLs by redirecting users to a safe environment, has been a common practice in email security. However, as cyberthreats evolve, it’s becoming clear that ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Office Worker

Unmasking the Sophisticated: How AI-Powered Defenses Thwart Advanced Phishing Attacks

Attackers are constantly refining their techniques for advanced phishing attacks to exploit the trust inherent in our digital systems. A recent incident we’ve captured highlights the alarming sophistication of modern phishing attempts, ...
Google Yahoo spam Proofpoint spoofed phishing

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

A hacker exploited a misconfiguration in Proofpoint's email protection platform to send millions of spoofed phishing emails from companies like IBM, Nike, and Disney looking to steal money and credit card information ...
Security Boulevard
Evolution of Phishing Attacks

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization

The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...
Evolution of Phishing Attacks

The Evolution of Phishing Attacks: Beyond Email and How to Protect Your Organization

The Evolution of Phishing Attacks: Beyond Email Phishing attacks have long been synonymous with email, but the landscape of cyberthreats has evolved dramatically. Today, phishing is not confined to email inboxes; it ...