2019/20’s 10 biggest, boldest, and most brazen business email compromise scams

Understand how email scams work to know how they can be avoided

whitepaper
Proofpoint logo

Telling the difference between authentic emails and an impostor’s scam is not always easy. That’s because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone. 

This whitepaper offers a roundup of the most high-profile (and low-minded) BEC and email account compromise (EAC) attacks of the last 12 months.

Download it now to understand how email scams work and know how they can be avoided.

Recommended

Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021