CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Phishing Campaign
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing Campaign

Woman holding mobile phone with username and password login screen showing phishing campaign
Cyber SecurityNews

Attackers Load Targeted Company’s Homepage in Email Phishing Campaign

September 11, 2020
Researchers found that hackers were harvesting enterprise login details by overlaying legitimate companies' webpages with fake login prompts in an email phishing campaign. Read More
Businessman using tablet in car showing the Perswaysion phishing campaign that is targeting C-suite executives at international organizations
Cyber SecurityNews

Widespread “Perswaysion” Phishing Campaign Is Targeting the C-Suite of Hundreds of International Organizations

May 12, 2020
A new phishing campaign that chains exploits from Microsoft’s Sway, OneNote and Sharepoint services is targeting C-suite executives at a wide range of organizations worldwide. Read More
Security locks with hook on keyboard showing hackers targeting UN with phishing campaign
Cyber SecurityNews

Hackers Target UN and Humanitarian Organizations With Phishing Campaign

November 1, 2019
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials. Read More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results