Blog

A new phishing-as-a-service (PhaaS) operation called “BulletProofLink” provides customers with over 100 templates mimicking popular brands and services.
Read more
Do you really need to backup 'the cloud'? In this article, we talk about why cloud storage isn't 100% reliable and why SaaS (cloud-to-cloud) backup is needed.
Read more
Many businesses had no choice but to figure out how to go remote - some at the expense of sustainable security. Read a CIO's top security tips for remote work.
Read more
Digital attackers launched a phishing campaign where they impersonated the U.S. Department of Transportation (USDOT) to steal victims’ Microsoft credentials.
Read more
The cybercriminal group FIN7 has launched several email campaigns that use multiple lures to distribute its Griffon backdoor.
Read more
The U.S. Department of the Treasury sanctions a cryptocurrency exchange for helping to facilitate the financial transactions of ransomware actors.
Read more
Artificial intelligence is reshaping threats like spear phishing. Just as organizations use “defensive AI” to protect, attackers use “offensive AI” to automate.
Read more
Malicious actors used Word documents carrying “Windows 11 Alpha” as their theme to deliver a JavaScript backdoor.
Read more
In a recent blog post, I discussed two email campaigns where attackers used Microsoft to steal recipients’ credentials.
Read more
Digital attackers are using Microsoft-themed attacks emails to redirect victims to phishing sites hosted on CodeSandbox and IBM Cloud.
Read more
Those of you in the Zix/AppRiver partner family know we pride ourselves on having your back and being Phenomenal everyday. This is one time that we feel you’ll really want to lean on our partnership as we guide you through the changes and the corresponding effect on your business.
Read more
New penalties and attention from the Colonial Pipeline attack has caused difficulty for ransomware operations to continue, forcing them to change their names.
Read more