Dropping Anchor: From a TrickBot Infection to the Discovery of the Anchor Malware
Cybereason Nocturnus detected a series of targeted attacks against high-profile targets that uses a new variant of Anchor_DNS and a new malware dubbed Anchor.
LOLbins and trojans: How the Ramnit Trojan spreads via sLoad in a cyberattack
Cybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate […]
Attackers turn to masquerading icons to boost phishing attack’s success
Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome.
What to Expect from the Biggest Threat Actors During the Winter Olympics
Over the last decade, cyberattacks during the Olympic Games have increased. Here's what to expect from major threat actors during next month's Winter Games.
Attackers use tax season to spread malware, launch phishing attacks
Uncle Sam isn't the only one looking for your money during tax season. Fraudsters are using the build up to the April 18 tax filing deadline to spread malware […]
What You Need to Know About Coronavirus
on February 27, 2020
The Centers for Disease and Prevention is responding to an outbreak of respiratory disease caused […]
What Is Multifactor Authentication?
on January 21, 2020
An update to ALTA’s Title Insurance and Settlement Company Best Practices that went into effect […]
HTTPS vs. HTTP
on December 17, 2019
Many companies still use what's commonly known as HTTP (Hypertext Transfer Protocol) to communicate […]
The Business Value of ‘Thank You’
on December 12, 2019
By Cindy McGovern Remember the last time a client, a boss or a co-worker gave you a handwritten […]
Business Continuity: Have a Plan
on December 5, 2019
Earlier this year, while Americans across the country were still celebrating July 4th, Jaime […]
What is Data Breach Insurance?
on February 28, 2020
Learn about data breach insurance, why it's important, how it works, and what to look for in a policy in the latest Data Protection 101, our series on the […]
Intangibles of CCPA 2.0 Loom Over RSA Privacy Talks
on February 27, 2020
Th California Consumer Privacy Act is nebulous as it is. Potential changes to the state's privacy laws, slated for later this year, could cloud things further.
Digital Guardian Wins Best Data Loss Prevention (DLP) Solution at SC Awards 2020!
on February 26, 2020
We're thrilled to share that Digital Guardian won the Best Data Loss Prevention (DLP) Solution at the 2020 SC Trust Awards at RSA Conference!
Digital Guardian Unveils New Managed Detection and Response Service
on February 25, 2020
Digital Guardian is pleased to share that effective today, we've launched a new Managed Detection & Response (MDR) service to better help customers secure […]
What is Cyber Insurance?
on February 24, 2020
What is cyber insurance? Get a definition, learn why it's important, how it works, best practices, and more in this week's Data Protection 101, our series on […]
How Adversaries Use Politics for Compromise
on November 5, 2019
Cisco Talos recently discovered several malware distribution campaigns where the adversaries were […]
C2 With It All: From Ransomware To Carding
on November 4, 2019
Cisco Talos recently discovered a new server hosting a large stockpile of malicious files. […]
Threat Roundup for October 25 to November 1
on November 1, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 25 […]
The commoditization of mobile espionage software
on October 30, 2019
Mobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps […]
Threat Roundup for October 18 to October 25
on October 25, 2019
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct 18 […]
Evasion Techniques: Geoblocking by IP
Not all phish are designed to target everyone, especially not analysts. Here's how threat actors use geoblocking to ensure their targets see it first.
Breakfast, Lunch, and Bourbon at RSA Conference 2020
Heading to RSA? Spend some time with PhishLabs while you're there. We're hosting several events. Relax with a quality bourbon, get a break from the crowds, and […]
The PhishLabs Blog | Email Incident Response
Email Incident Response | The latest thought leadership and resources for combating phishing and social engineering attacks.
Social Media Phishing: Beyond Credential Theft
Credential theft is a common goal for threat actors, but big losses come from romance scams, abuse of social brands, and even source code dumps.
Why You Should Take Social Media Account Takeover as Seriously as a BEC Attack
Much like a threat actor can pose as an executive in BEC attacks, they can take over a social media account and abuse the inherent trust we have with it.
We’re stepping up to North Dakota. Here’s why.
on December 18, 2019
Back in August 2019, the legislators of North Dakota felt it was within their power to violate your […]
Is your partner cheating? Here’s a surefire way to catch a cheating spouse
on August 6, 2018
Need to find out if your partner is cheating on you? Heartbreak. Betrayal. Anger. Insecurity. […]
Anonymous Texting: How to Easily Send Fake Text Messages
on April 2, 2018
Need to send an anonymous text? Here’s everything you need to know. In this technological […]
Want to Place Free Prank Calls? Here’s How.
on April 1, 2018
Here’s how you get started prank calling people for FREE. Prank calls can be really, really […]
How to Hide Caller ID: Your Guide to Staying Anonymous on the Phone
on March 28, 2018
Do you know how to hide caller ID? We’ll let you in on a few secrets. Your caller ID. […]