Quantcast
Channel: Cofense
Browsing latest articles
Browse All 23 View Live

Image may be NSFW.
Clik here to view.

Unmasking a Cyber Attack that Targets Meta Business Accounts

/*! elementor - v3.18.0 - 20-12-2023 */ .elementor-widget-text-editor.elementor-drop-cap-view-stacked...

View Article


Image may be NSFW.
Clik here to view.

Threats That Hide in Your Microsoft Office Documents

By Nathaniel Raymond Microsoft Office documents in the Office365 software suite have become a mainstay for many users who need to create documents for business reports, college essays, resumes,...

View Article


Image may be NSFW.
Clik here to view.

STR RAT – Phishing Malware Baseline

By Jacob Malimban STR RAT is a remote access trojan (RAT) written in Java that was first seen in 2020. Like other RATs, it gives threat actors full control when it is successfully installed onto a...

View Article

Cofense Adds Email Security Risk Management and Validation Reporting to PhishMe®

The New Employee Engagement Index empowers employees; making them security allies, not liabilities. LEESBURG, Va. – June 26, 2024 – Cofense®, the leader in email threat detection and response...

View Article

Image may be NSFW.
Clik here to view.

New Malware Campaign Targeting Spanish Language Victims

Cofense recently identified and named a new malware called Poco RAT, which is a simple Remote Access Trojan that targets Spanish language victims. It was first observed in early 2024, primarily...

View Article


Image may be NSFW.
Clik here to view.

A “Meta” Facebook Phish

Found in Environments Protected By: Microsoft By Andrew Mann, Cofense Phishing Defense Center Everyone today has some form of social media, whether it is Instagram, X, YouTube or Facebook. It is an...

View Article

Image may be NSFW.
Clik here to view.

Beware of the Latest Phishing Tactic Targeting Employees

Found in Environments Protected By: Google, Outlook 365, Proofpoint By Sabi Kiss, Cofense Phishing Defense Center Phishing attacks are becoming increasingly sophisticated, and the latest attack...

View Article

Image may be NSFW.
Clik here to view.

SEG vs. SEG: How Threat Actors are Pitting Email Security Products Against...

Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website....

View Article


Image may be NSFW.
Clik here to view.

Malware Exploit Bypasses SEGs Leaving Organizations at Risk

Threat actors continually leverage and create a plethora of tactics to bypass Secure Email Gateways (SEGs). These include encoding malicious URLs with other SEG protection tools, obfuscating file...

View Article


Image may be NSFW.
Clik here to view.

Cofense Catches Phishing Emails Missed by Proofpoint and Abnormal Security

In a recent wave of phishing attacks, cybercriminals managed to bypass secure email gateways (SEGs) from both Proofpoint and Abnormal Security to deliver emails that employed Microsoft-spoofing and...

View Article

The Evolution of Phishing: How AI is Revolutionizing Cybersecurity Threats

Phishing attacks have been a prevalent cybersecurity threat for years, but with the advancement of artificial intelligence (AI), threat actors are now able to create more sophisticated and convincing...

View Article

Coming Soon!  Triage Custom AI Spam Filtering 

Author: Rachel Roldan, Senior Director of Product Management  I’m excited to share with our customers that coming soon, Triage will offer a new, AI-powered Spam Filtering feature within our Triage...

View Article
Browsing latest articles
Browse All 23 View Live