Blog
A new phishing-as-a-service (PhaaS) operation called “BulletProofLink” provides customers with over 100 templates mimicking popular brands and services.
Read moreDo you really need to backup 'the cloud'? In this article, we talk about why cloud storage isn't 100% reliable and why SaaS (cloud-to-cloud) backup is needed.
Read moreMany businesses had no choice but to figure out how to go remote - some at the expense of sustainable security. Read a CIO's top security tips for remote work.
Read moreDigital attackers launched a phishing campaign where they impersonated the U.S. Department of Transportation (USDOT) to steal victims’ Microsoft credentials.
Read moreThe cybercriminal group FIN7 has launched several email campaigns that use multiple lures to distribute its Griffon backdoor.
Read moreThe U.S. Department of the Treasury sanctions a cryptocurrency exchange for helping to facilitate the financial transactions of ransomware actors.
Read moreArtificial intelligence is reshaping threats like spear phishing. Just as organizations use “defensive AI” to protect, attackers use “offensive AI” to automate.
Read moreMalicious actors used Word documents carrying “Windows 11 Alpha” as their theme to deliver a JavaScript backdoor.
Read moreIn a recent blog post, I discussed two email campaigns where attackers used Microsoft to steal recipients’ credentials.
Read moreDigital attackers are using Microsoft-themed attacks emails to redirect victims to phishing sites hosted on CodeSandbox and IBM Cloud.
Read moreThose of you in the Zix/AppRiver partner family know we pride ourselves on having your back and being Phenomenal everyday. This is one time that we feel you’ll really want to lean on our partnership as we guide you through the changes and the corresponding effect on your business.
Read moreNew penalties and attention from the Colonial Pipeline attack has caused difficulty for ransomware operations to continue, forcing them to change their names.
Read more