Unmasking a Cyber Attack that Targets Meta Business Accounts
/*! elementor - v3.18.0 - 20-12-2023 */ .elementor-widget-text-editor.elementor-drop-cap-view-stacked...
View ArticleThreats That Hide in Your Microsoft Office Documents
By Nathaniel Raymond Microsoft Office documents in the Office365 software suite have become a mainstay for many users who need to create documents for business reports, college essays, resumes,...
View ArticleSTR RAT – Phishing Malware Baseline
By Jacob Malimban STR RAT is a remote access trojan (RAT) written in Java that was first seen in 2020. Like other RATs, it gives threat actors full control when it is successfully installed onto a...
View ArticleCofense Adds Email Security Risk Management and Validation Reporting to PhishMe®
The New Employee Engagement Index empowers employees; making them security allies, not liabilities. LEESBURG, Va. – June 26, 2024 – Cofense®, the leader in email threat detection and response...
View ArticleNew Malware Campaign Targeting Spanish Language Victims
Cofense recently identified and named a new malware called Poco RAT, which is a simple Remote Access Trojan that targets Spanish language victims. It was first observed in early 2024, primarily...
View ArticleA “Meta” Facebook Phish
Found in Environments Protected By: Microsoft By Andrew Mann, Cofense Phishing Defense Center Everyone today has some form of social media, whether it is Instagram, X, YouTube or Facebook. It is an...
View ArticleBeware of the Latest Phishing Tactic Targeting Employees
Found in Environments Protected By: Google, Outlook 365, Proofpoint By Sabi Kiss, Cofense Phishing Defense Center Phishing attacks are becoming increasingly sophisticated, and the latest attack...
View ArticleSEG vs. SEG: How Threat Actors are Pitting Email Security Products Against...
Email security tools such as Secure Email Gateways (SEGs) often encode URLs that are embedded in emails. This enables the security appliance to scan the URL before the recipient visits the website....
View ArticleMalware Exploit Bypasses SEGs Leaving Organizations at Risk
Threat actors continually leverage and create a plethora of tactics to bypass Secure Email Gateways (SEGs). These include encoding malicious URLs with other SEG protection tools, obfuscating file...
View ArticleCofense Catches Phishing Emails Missed by Proofpoint and Abnormal Security
In a recent wave of phishing attacks, cybercriminals managed to bypass secure email gateways (SEGs) from both Proofpoint and Abnormal Security to deliver emails that employed Microsoft-spoofing and...
View ArticleThe Evolution of Phishing: How AI is Revolutionizing Cybersecurity Threats
Phishing attacks have been a prevalent cybersecurity threat for years, but with the advancement of artificial intelligence (AI), threat actors are now able to create more sophisticated and convincing...
View ArticleComing Soon! Triage Custom AI Spam Filtering
Author: Rachel Roldan, Senior Director of Product Management I’m excited to share with our customers that coming soon, Triage will offer a new, AI-powered Spam Filtering feature within our Triage...
View Article