Phishing
Discover expert analysis on phishing with news, features and insights from the team at IT Pro.
-
Why ‘malware as a service’ is becoming a serious problem
News Researchers have issued a warning over the rise of 'malware as a service' platforms amid a surge in attacks over the last year.
By Solomon Klappholz Published
News -
Hackers are using this new phishing technique to bypass MFA
News Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens.
By Solomon Klappholz Published
News -
Threat actors are leaning on trusted services more than ever
News Cyber threats are increasingly incorporating legitimate services in their attack chain, researchers warn.
By Solomon Klappholz Published
News -
New phishing campaign exploits Microsoft’s legacy ADFS identity solution
News Researchers at Abnormal Security have warned of a new phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS) secure access system.
By Solomon Klappholz Published
News -
Phishing campaign targets developers with fake CrowdStrike job offers
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
News -
Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachments
News Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months.
By Solomon Klappholz Published
News -
How hackers are using legitimate tools to distribute phishing links
News Research indicates 2024 has ushered in a new era of phishing where threat actors have become increasingly adept at concealing their malicious links
By Solomon Klappholz Published
News -
2024 State of the phish report
Whitepaper Risky actions, real-world threats and user resilience in an age of human-centric cybersecurity
By ITPro Last updated
Whitepaper -
Cloud security fears, rising costs, privacy concerns?
Whitepaper The factors driving the demand for on-premises infrastructure
By ITPro Published
Whitepaper -
Advanced email security
Whitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
By ITPro Published
Whitepaper -
Metrics that matter
Whitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
By ITPro Published
Whitepaper -
The cost of ‘good enough’ security
Whitepaper Calculating the true value of cybersecurity solutions
By ITPro Published
Whitepaper