Angler Phishing
A phishing attack via social networks such as LinkedIn, Facebook, Instagram, X (Twitter), and Snapchat.
A phishing attack via social networks such as LinkedIn, Facebook, Instagram, X (Twitter), and Snapchat.
These attacks involve spoofed or compromised email accounts used to manipulate normal business workflows and redirect funds. What makes BEC especially dangerous is that it often does not require malware. It relies on trust, timing, and persuasion.
A cyberattack is a deliberate attempt by an individual or group to compromise another party’s information system. Attackers typically aim to disrupt operations or gain unauthorized access to data for personal or organizational gain.
Read MoreA highly realistic, AI-generated image, video, or audio, created to convincingly impersonate someone or some event. In cybersecurity, deepfakes are used to trick users into taking an action, like redirecting funds or sharing confidential information.
A social engineering attack in which the attacker tries to trick the victim into giving up sensitive information by masquerading as a trusted entity.
Read MoreA type of targeted phishing attack where the attacker uses gathered details about the targeted victim to increase the credibility of the attack message.
A type of phishing attack that uses VoIP or phone calls in an attempt to elicit information from unsuspecting victims.
A type of spear-phishing attack specifically targeted at high-ranking executives in an organization.