CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Phishing
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Phishing

Image of locks, keys and fishing hook on keyboard representing how businesses are victims of phishing attacks
Cyber SecurityInsights

Phishing for Data: All Businesses are Victims

September 20, 2017
Phishing attacks account for 49% of cybercrime, making them the biggest threat to your company's cyber security. Is your company and employees protected?
Read More
Crowded night market showing extremely low barriers to entry for spammers in the phishing ecosystem
Cyber SecurityNews

New Report on Spammers and the Phishing Ecosystem Reveals Extremely Low Barriers to Entry

March 4, 2020
Spammers are stepping up their game in the phishing ecosystem with premade tools such as phishing templates, infrastructure and tutorials made widely available on underground forums.
Read More
Employees working on computer taking part in phishing awareness training
Cyber SecurityNews

Phishing Awareness Training is Far From Permanent; New Study Shows the Effects Last Only a Few Months

October 5, 2020
Study shows effects of phishing awareness training starts to wear off after four months and many employees will have lost what they learned almost entirely after six months.
Read More
Man holding fingers crossed behind his back showing threat of phishing and disinformation
Cyber SecurityInsights

Race Relations, Phishing, and the War Against Disinformation

September 24, 2020
The most sophisticated technology in the world is not enough to combat phishing scams. which aren’t designed to break through firewalls or circumvent email gateways or endpoint security.
Read More
Hacker using mobile smartphone for phishing and ransomware
Cyber SecurityInsights

Cybersecurity in 2018: What You Need to Know

July 9, 2018
Cybersecurity issues in 2018 are becoming a day-to-day struggle for businesses. To keep your organization and customers secure, you will need to know the latest movements in cybersecurity.
Read More
One hundred dollar bill on fish hook showing scammers using social media networks as favorite phishing spot
Cyber SecurityInsights

Social Media Networks Is a Favorite Phishing Spot for Scammers Because It’s Easy Pickings

March 18, 2020
Scammers have taken to social media networks as their favorite spot for phishing attacks as there are billions of registered users with a vast majority of them practicing little to no account security.
Read More
Padlock on hook over keyboard showing why phishing threatens a brand’s integrity
Cyber SecurityInsights

Why Phishing Threatens Your Brand’s Integrity

January 8, 2020
Study shows phishing attacks have reached the highest in three years and rising in emerging regions such as Brazil and other parts of South America. Why does it threatens a brand’s integrity?
Read More
Security locks with hook on keyboard showing hackers targeting UN with phishing campaign
Cyber SecurityNews

Hackers Target UN and Humanitarian Organizations With Phishing Campaign

November 1, 2019
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials.
Read More
Man standing puzzled among hanging hooks showing potential uptick in phishing attacks with millions of Facebook users’ phone numbers exposed in recent data breach
Cyber SecurityNews

Will Exposed Phone Numbers Cause an Uptick in Phishing Attacks, SIM Swaps and Spam?

September 17, 2019
419 million Facebook users are vulnerable to phishing attacks, SIM swaps and spam with their phone numbers exposed through a number of online databases found without password protection.
Read More
Close up of hacker hand using laptop with email icons showing phishing-as-a-service
Cyber SecurityInsights

Phishing-as-a-Service Brings Cybercrime to the Masses

January 20, 2022
Historically, to become a successful hacker, you had to have the knowledge and skills to create your own attacks from scratch. However, all that has changed with the proliferation of the underground market for phishing-as-a-service.
Read More
Load More

Latest

The UPMC, University of Pittsburgh Medical Center, showing DDoS attacks by Russian hacktivists

Russian Hacktivists Actively Targeting Hospitals With DDoS Attacks in the US and Pro-Ukraine Countries

Data Clean Rooms Alone Would Not Fix Meta’s Privacy Problems

Shield Icon against data and network showing zero trust and attack surface

Gartner: Slow Adoption and Expanding Attack Surface; Zero Trust Will Not Stop Over 50% Of Attacks by 2026

Hands holding smartphone using Google Fi service showing T-Mobile data breach

T-Mobile Data Breach Includes Massive Compromise of Google Fi Service, Unknown Quantity of Customer Records Exposed

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results