CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Phishing
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Crowded night market showing extremely low barriers to entry for spammers in the phishing ecosystem
Cyber SecurityNews

New Report on Spammers and the Phishing Ecosystem Reveals Extremely Low Barriers to Entry

March 4, 2020
Spammers are stepping up their game in the phishing ecosystem with premade tools such as phishing templates, infrastructure and tutorials made widely available on underground forums. Read More
Man in hood working on computer next to pile of cash showing the financial impact of phishing scam
Cyber SecurityNews

How Much Can a Phishing Scam Cost a Small Organization? For a Texas School District, the Bill Was $2.3 Million

January 28, 2020
Phishing scam perpetrated by attackers posing as vendors cheated the school district of approximately $2.3 million before the business compromise scheme was discovered about a month later. Read More
Microsoft Office 365 application icons on computer screen showing how hackers use Microsoft OAuth apps in new phishing attack
Cyber SecurityNews

Microsoft OAuth Apps the Target of Cunning New Phishing Attack

January 22, 2020
A new phishing attack started to surface where hackers leverage on Microsoft OAuth apps to steal user credentials from SharePoint and OneDrive users using official Office 365 login page. Read More
Padlock on hook over keyboard showing why phishing threatens a brand’s integrity
Cyber SecurityInsights

Why Phishing Threatens Your Brand’s Integrity

January 8, 2020
Study shows phishing attacks have reached the highest in three years and rising in emerging regions such as Brazil and other parts of South America. Why does it threatens a brand’s integrity? Read More
Fishing hook and unlocked padlock showing strategy needed for phishing
Cyber SecurityInsights

How to Develop Detection and Response Strategy for Email Phishing?

December 6, 2019
Phishing attacks are not going away by any means; however, they can be mitigated with a well-defined plan which includes detection, response, training, and prevention. Read More
Close-up image of hand using smartphone email icons showing the need for email security
Cyber SecurityInsights

Personal Email Security Guide

November 26, 2019
Email is the most used digital communication method in the world. Email is also still a hacker's favorite route to attacking a target, because most users don't bother with email security. Read More
Hacker working on laptop showing how the breach of leading domain name registrar could lead to an explosion in phishing scams
Cyber SecurityNews

Breach of Leading Domain Name Registrar Could Lead to an Explosion in Phishing Scams

November 11, 2019
Domain name registrar Web.com announced a data breach that could lead to an explosion of phishing scams as the exposed personal information can be connected directly to websites and their owners. Read More
Security locks with hook on keyboard showing hackers targeting UN with phishing campaign
Cyber SecurityNews

Hackers Target UN and Humanitarian Organizations With Phishing Campaign

November 1, 2019
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials. Read More
Man standing puzzled among hanging hooks showing potential uptick in phishing attacks with millions of Facebook users’ phone numbers exposed in recent data breach
Cyber SecurityNews

Will Exposed Phone Numbers Cause an Uptick in Phishing Attacks, SIM Swaps and Spam?

September 17, 2019
419 million Facebook users are vulnerable to phishing attacks, SIM swaps and spam with their phone numbers exposed through a number of online databases found without password protection. Read More
Group of surgeons working in surgical theatre showing the email security setbacks unique to healthcare
Cyber SecurityInsights

3 Email Security Setbacks Unique to Healthcare

August 14, 2019
Phishing is a massive cyber security threat and very much still plagues the healthcare industry. What are the email security setbacks faced by the healthcare providers which make them vulnerable? Read More
Load More

Latest

Clubhouse application on mobile phone screen showing threat of data scraping

Clubhouse Joins Facebook and LinkedIn as Target of Data Scraping; Cumulative One Billion User Profiles Have Been Leaked

Three men in bar with smartphones in hands showing challenges with DevSecOps

Developers, Security and Operations Walk into a Bar…

SAP system on virtual screen showing cyber attack on security vulnerabilities

Hackers Exploit Known Sap Security Vulnerabilities With a Typical Cyber Attack Succeeding In Record Time

Engineer checking intelligent factory showing state of IoT security

New Tripwire Survey: IoT Security Still in Shambles, Most Security Pros Struggling To Make Devices Fit Safely Into Business Networks

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Data Breach Regulations EU GDPR Cyber Threat
See all results