CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Phishing
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Clubhouse application icon on smartphone showing Clubhouse and Facebook users phishing and account takeover attacks
Cyber SecurityNews

“Combo File” Merging 3.8 Billion Phone Numbers from Clubhouse With Scraped Facebook Users Could Cause Surge in Phishing, Account Takeover Attacks

October 1, 2021
A new "combination file" offered on the dark web that makes connections between Clubhouse and Facebook users is a threat to create a spike in specific attack types, namely phishing and account takeover attempts.
Read More
Fishing hook on key on computer keyboard showing increase in phishing during pandemic
Cyber SecurityInsights

Phishing In a Post-Pandemic World

August 11, 2021
The pandemic accelerated the transition to cloud-based systems for many organizations. Unsurprisingly, there's an uptick of phishing attacks as cybercriminals took advantage of our collectively distracted attention spans and less-than-stellar security practices.
Read More
Fish hook with security locks showing phishing attack
Cyber SecurityInsights

Understanding & Defending Against the Top 5 Cognitive Bias Cybercriminals Most Exploit

August 3, 2021
Phishing emails are highly effective today because workers have been groomed to have an immediate response to them. Here is a breakdown of each of these widely-used cognitive responses.
Read More
Padlock with metal chain hooked and locked across computer keyboard showing ransomware attacks through employee phishing
Cyber SecurityNews

Ransomware Attacks Evade Strong Cyber Defenses While Phishing Remains an Easy Initial Entry Point Despite Employee Training

July 23, 2021
Report found that most organizations that suffered successful ransomware attacks since 2019 had perimeter defenses in place and had trained their employees on phishing.
Read More
Fish hook with keys on computer circuit board showing phishing and need for security awareness
Cyber SecurityInsights

What To Do When Your Organization Become the Victim of a Phishing Attack

July 20, 2021
Knowing the common manipulative tactics – exploiting every emotional hot button (anxiety, uncertainty, urgency) – used in phishing is the first step to understanding how to identify and deflect them; and it requires a repetitive process.
Read More
Slack app on smartphone screen showing security concerns
Cyber SecurityNews

“Slack Connect” Direct Messaging Feature Revamped in a Matter of Days Due to Serious Security Concerns

March 29, 2021
Slack debuted its long-awaited direct messaging feature but within just a few days it was gone, pulled due to a technical oversight that created major security concerns.
Read More
Man holding glasses while starting at laptop showing challenges of misinformation
Cyber SecurityInsights

Identifying—and Challenging—Your Cognitive Biases To Curb Misinformation

December 29, 2020
Entire populations are being manipulated through increasingly prevalent and hyper-compelling information typically spread via social media, designed to invoke emotion and exploit known biases and provoke a tsunami of misinformation.
Read More
Employees working on computer taking part in phishing awareness training
Cyber SecurityNews

Phishing Awareness Training is Far From Permanent; New Study Shows the Effects Last Only a Few Months

October 5, 2020
Study shows effects of phishing awareness training starts to wear off after four months and many employees will have lost what they learned almost entirely after six months.
Read More
Man holding fingers crossed behind his back showing threat of phishing and disinformation
Cyber SecurityInsights

Race Relations, Phishing, and the War Against Disinformation

September 24, 2020
The most sophisticated technology in the world is not enough to combat phishing scams. which aren’t designed to break through firewalls or circumvent email gateways or endpoint security.
Read More
I voted today sticker on a mans shirt showing threat of typosquatting on the 2020 presidential election
Cyber SecurityNews

Will “Typosquatting” Influence the 2020 Presidential Election?

September 8, 2020
The 2020 presidential election is being targeted by typosquatting, but most of the activity has been focused on stealing personal information rather than trying to sway the vote.
Read More
Load More

Latest

Hand on laptop keyboard showing data breach of Australia financial service provider

Data Breach of Financial Service Provider Latitude Jumps From 328,000 to 14 Million Records Stolen

Prancing horse on Ferrari logo showing data breach impacting customer data

Ferrari Disclosed a Data Breach Impacting Customer Data but Refused to Pay Ransom

Hacker using laptop showing penetration test and attack surface

The Anatomy of a Comprehensive Penetration Test

Smartphone with Twitter logo and Elon Musk on background showing source code leak

Partial Twitter Source Code Leak on GitHub Uploaded Shortly After First Round of Layoffs

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results