Phishing
Discover expert analysis on phishing with news, features and insights from the team at IT Pro.
-
Phishing campaign targets developers with fake CrowdStrike job offersNews Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike
By Solomon Klappholz Published
News -
Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachmentsNews Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months.
By Solomon Klappholz Published
News -
How hackers are using legitimate tools to distribute phishing linksNews Research indicates 2024 has ushered in a new era of phishing where threat actors have become increasingly adept at concealing their malicious links
By Solomon Klappholz Published
News -
2024 State of the phish reportWhitepaper Risky actions, real-world threats and user resilience in an age of human-centric cybersecurity
By ITPro Last updated
Whitepaper -
Cloud security fears, rising costs, privacy concerns?Whitepaper The factors driving the demand for on-premises infrastructure
By ITPro Published
Whitepaper -
Beyond awareness trainingWhitepaper Building a sustainable security culture - and why it matters
By ITPro Published
Whitepaper -
Turning the tablesWhitepaper How smart email reporting and remediation can transform attackers’ favourite targets into your best defence
By ITPro Published
Whitepaper -
Cloud in the crosshairsWhitepaper How cyber criminals exploit file-sharing, identity, and supply chain vulnerabilities in Microsoft 365
By ITPro Published
Whitepaper -
The human factor report 2023Whitepaper Analysing the cyber attack chain
By ITPro Published
Whitepaper -
The cost of ‘good enough’ securityWhitepaper Calculating the true value of cybersecurity solutions
By ITPro Published
Whitepaper -
Advanced email securityWhitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
By ITPro Published
Whitepaper -
Metrics that matterWhitepaper The CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense
By ITPro Published
Whitepaper