Back to blog

Posts written
by Adrien Gendre

Microsoft 365

Office 365 Phishing Attacks: How Hackers Get Access to Your Business

With 258 million corporate users, the highly popular Microsoft platform has become a target-rich environment for...
Email Security

3 Ways an Email Feedback Loop Boosts Security Awareness

Reporting an email threat is one of the most important steps users can take to help secure their businesses and...

Email Security

Why It’s So Hard to Spot a Spoofed Email

Email spoofing is single most common feature between phishing and spear phishing emails. The methods hackers use to...

Spear Phishing

Pretexting: 5 Examples of Social Engineering Tactics

Pretexting is a form of social engineering used to manipulate victims into divulging sensitive information. Hackers...

Phishing

Facebook Phishing: Why Social Media is a New Phishers' Favorite

For the second straight quarter, Facebook was the second most impersonated brand in phishing attacks in our quarterly ...

Email Security

Multiphase Attacks: One Email Ignites Chaos in Microsoft 365

A multiphase attack combines phishing with spear phishing and insider attack techniques. Difficult to detect and...

Phisher's Favorites

Phishers’ Favorites: File phishing spreads; banks targeted

Today, we published our Phishers’ Favorites report for Q1 2020. Now in its eighth edition, Phishers’ Favorites ranks...