Digital attackers are using Microsoft-themed attacks emails to redirect victims to phishing sites hosted on CodeSandbox and IBM Cloud.
Read moreThose of you in the Zix/AppRiver partner family know we pride ourselves on having your back and being Phenomenal everyday. This is one time that we feel you’ll really want to lean on our partnership as we guide you through the changes and the corresponding effect on your business.
Read moreNew penalties and attention from the Colonial Pipeline attack has caused difficulty for ransomware operations to continue, forcing them to change their names.
Read moreEmail attackers are increasingly using customized phishing campaigns to target users. Read more about these highly targeted attacks here.
Read moreRansomware actors use double encryption to complicate the recovery process for victims so they will be more inclined to pay. Read to learn more about it here.
Read morePhishers used a cross-site scripting (XSS) flaw in the UPS website to distribute malware using email subject line “UPS Delivery Exception: Action Required”.
Read moreOrganizations need to be prepared to defend against ransomware. But what does “ransomware defense” mean and how does it look in practice? One word: prevention.
Read moreMalicious actors used emails carrying executable (.EXE) file attachments to target recipients with Demonware ransomware.
Read moreData backups are a top security measure used for ransomware attack recovery, but having a robust data backup strategy is just as important. Here are some tips.
Read morePhishers leveraged emails with the subject line “Payment Slip” to target unsuspecting users with samples of the Oski infostealer to steal bank data.
Read more