Inbound phishing attacks become more prevalent and sophisticated every month. Get the latest intelligence to share with your users and keep your organization safe.
- What you need to know abut the Microsoft Exchange hack
Four vulnerabilities have been identified in Microsoft Exchange that open organisations up to malicious attacks. Here are the key details you need to know.
- How to spot a phishing email | Cybersecurity | Egress UK
With an estimated 135 million phishing emails sent every day worldwide learning how to spot them is crucial. Discover Egress's infographic to help you spot.
- How to prevent email phishing | Cybersecurity | Egress UK
If anything, the number of phishing attempts is increasing, costing enterprise organisations millions of dollars to deal with phishing attacks.
- What is spear phishing | Cybersecurity | Egress UK
Spear phishing is when a fraudulent email pretending to be from a known contact or organisation to trick the recipient into sharing confidential information.
- Trouble with DMARC | Phishing | Egress UK
DMARC. (Domain-based Message Authentication, Reporting, and Conformance), an open standard that can help prevent phishing attacks.
- UK Universities & Spear Phishing attacks | Egress UK
State sponsored cyber actors have stepped up their attacks against UK leading universities - learn what to watch out for.
- Can artificial intelligence stop people from being phished?
It's impossible for users to catch every phishing email. Learn how AI-based solutions understand and support normal human behaviour.
- Intelligent anti-phishing solution: Egress Defend
We’re thrilled to announce the launch of our new product: Egress Defend, adding powerful anti-phishing capabilities to our Intelligent Email Security platform.
- Five tips to avoid spear phishing attacks | Egress UK
Learn to safeguard against spear phishing with our five key tips. Boost your cybersecurity awareness, improve security systems, and counter evolving threats.
- Human layer security: Last line of defence against phishing
When phishing attacks get through, people are your last line of defence. Find out how to reinforce them.
- What to do if you’ve been phished | Phishing | Egress
We outline what you need to do when you fall victim to a phishing attack and how you can avoid them in the future.
- Bias and phishing: How machine learning can protect us
Egress DPO Kevin Tunison shares how to address the difficult (and often overlooked) issue of bias and cybersecurity.
- Reporting phishing emails| Phishing | Egress UK
One in every 3,722 emails in the UK is a phishing attempt. That's why reporting phishing emails is essential in avoiding threat. Here's some tips on how
- Killing the kill chain: Stop phishing and you’ll stop ransomware
Ransomware is a major threat to US businesses. Hear from Egress experts on how to stop phishing and cut cybercriminals off at the source.
- Preventing spear phishing: What you need to know | Egress
Find out everything you need to know about spear phishing attacks and learn how to prevent spear phishing in this guide by Egress.
- What is whaling? | Phishing | Egress UK
Whaling directly targets high-level executives for a big payout. Here's everything you need to know about whaling and how to defend against it
- What is business email compromise (BEC)? | Phishing | Egress UK
In this article, we'll explain what Business Email Compromise is, how to spot the signs of a BEC attack, and how to prevent them. Learn more now.
- Impersonating executives | Phishing | Egress UK
Impersonation fraud, or CEO fraud, has been the scourge of UK boardrooms in recent years. Learn more about how CEO fraud works.
- What's the goal of BEC? | Phishing | Egress
Business email compromise (BEC) is a rapidly growing form of cybercrime. Learn what makes BEC such a lucrative form of phishing for cybercriminals.
- 3 things to do after a BEC attack | Phishing | Egress UK
Don't let business email compromise bring your business down. Here are three key actions to take straight away if it strikes.
- How cybercriminals work together to take down your organization
Find out how cybercriminals are working together to share knowledge and boost the success of their attacks against organisations.
- Seven signs of a phishing email
Learn the seven most common signs that you've been targeted by a phishing email. Don't get caught out!
- Account takeover (ATO) ultimate guide | Phishing | Egress
Account takeover (ATO) is a dangerous outcome of phishing. Find out what you need to know to stay safe in Egress' latest expert guide on keeping your account secure.
- How to prevent account takeover (ATO) | Egress
Learn how to detect (and prevent) account takeover attacks against your business employees and users in our latest guide.
- CEO fraud attacks & how to stop them | Phishing | Egress
Learn about CEO fraud attacks and how they happen. Discover how to recognise CEO fraud attempts and halt them in their tracks with this expert guide by Egress.
- Will insurance firms stop paying out for ransomware attacks?
Hear from Egress Threat Intelligence VP Jack Chapman on why insurance companies are rethinking their policies around ransomware attacks.
- How to recognize and prevent impersonation attacks
Impersonation is a dangerous phishing tactic. Learn how to spot and prevent impersonation attacks before they lead to a serious breach.
- Crime-as-a-service: How anyone can become a hacker | Egress
Crime-as-a-service makes cybercrime accessible to more people. Hear from Egress Threat Intelligence VP Jack Chapman on how anyone can become a hacker.
- Why social graphs won’t save you from account takeover
Social graphs are a valuable tool - but you need more to stay safe from account takeover attacks. Learn how to protect your business in our latest guide.
- What is ransomware? | Phishing | Egress
Worried about ransomware? Here's what you need to know about the threat of ransomware and how to protect your business.
- Healthcare target for ransomware | Egress
Understand why healthcare organisations are major targets for ransomware attacks and learn how they can protect themselves.
- Hit by hackers? You’re now a target for more attacks | Egress
Research shows that 80% of organisations targeted by ransomware end up suffering another attack & 46% are targeted by the same cybercriminals
- How to stop rising ransomware | Phishing | Egress UK
Ransomware is running wild right now. Read our latest guide on how to make sure you're not caught up in the chaos.
- Ransomware: 2023's top attacks and need-to-know stats | Egress
Ransomware continues to evolve, and attacks are rising year on year. Learn more about the 2023 stats surrounding ransomware.
- Seven new (and convincing!) phishing scams to watch out for
Cybercriminals are constantly coming up with new phishing scams. Learn what to watch out for in seven recent phishing scams that we've seen doing the rounds.
- Must-know phishing statistics - updated for 2024 | Egress
Businesses have been forced to accelerate adoption of new security technologies. Arm yourself with need-to-know facts and statistics about phishing in 2024.
- Supply chain attacks: Who’s your weakest link?
Your cybersecurity weak link might not be within your own business. Understand the landscape of supply chain attacks and how to protect yourself.
- Human cost of a phishing attack (Part 1)
Here's an example of a phishing attack during a typical workday and how to recognise & prevent these type of threats.
- Human cost of phishing: A workday attack example Part 2
Scared to cause a major data breach for your company? Here's part 2 example of a workday phishing attack and how to recognise & prevent these type of threats
- Deepfake phishing: Should we be concerned?| Egress
We're expecting deepfake phishing to become a growing threat over the coming years. Here's what you need to know.
- The psychology of social engineering and phishing | Egress
Why do we fall for phishing? Understand the psychological triggers cybercriminals use - and learn how to use that knowledge against them.
- Help insiders to stop advanced phishing threats | Blog
Phishing is rigged in favour of the cybercriminals. Start considering phishing as an insider threat and boost your chances of beating it.
- Hit by hackers podcast | Egress
Egress CEO Tony Pepper discusses how phishing attacks are growing more sophisticated and how you can protect your business at the British Legal Tech Forum
- First ransomware, now killware. Can it be stopped? | Egress
Killware is ransomware turned deadly and is fast becoming a serious threat. Learn what is, how it works and whether enough is being done to stop it.
- How does phishing lead to ransomware attacks? | Egress
Cybercriminals are launching ransomware attacks through advanced phishing designed to trick employees in order to gain access to your system.
- FBI email hack highlights danger of account takeover
Get the full picture on how the FBI were hacked via email account takeover - and why we're lucky the outcome wasn't a lot more serious for the email recipients.
- The difference between spam & scam emails? | Phishing | Egress
Spam emails can definitely be annoying - but there are some key differences between spam and phishing scams. Learn about the intent behind both types of email.
- What are phishing, smishing, and vishing attacks? | Egress
Businesses are bombarded with phishing attacks every day - but email isn't your only concern. Learn how to stay safe from smishing, vishing, and quishing too.
- Microsoft 365 email scams to watch out for | Blog | Egress
Cybercriminals attack Microsoft 365 as they know it has millions of users worldwide. Learn their phishing tactics so you can keep your business and users safe.
- Holiday phishing season: Your guide to staying scam-safe | Egress
There's always a spike in phishing around Black Friday and Christmas. Learn how to stay safe from scams and phishing kits this holiday season.
- How spear phishing attacks catch employees out | Egress
Why is spear phishing so effective at catching employees out? Learn the tactics cybercriminals use to trick employees into interacting with phishing emails.
- Why are account takeover attacks so dangerous? | Egress
Account takeover attacks are front of mind for security leaders. But what makes them so dangerous and effective compared to other email-based cyberattacks?
- Laptop running slow? You might have been cryptojacked.
Might there be something more sinister behind your latest tech troubles? Learn why your organization could be a prime target for cryptojacking cybercriminals.
- Ukraine tensions boost UK businesses cyber defenses | Egress
After a week of diplomatic discussions over the tensions in Ukraine, regulators have strongly advised businesses to improve cybersecurity for potential attacks.
- LinkedIn phishing attacks up 232% | Phishing | Egress
See the new email phishing attacks that use display name spoofing and stylized templates to impersonate LinkedIn and harvest victims’ credentials.
- Natural language processing explained | Phishing | Egress
Read this article to discover how cyber defenders can use NLP to protect systems from spear-phishing attacks.
- Why is zero-trust so important in cybersecurity | Egress
Phishing email attacks are on the rise organizations struggle to defend themselves. Learn more about zero trust and how it relates to the cyber threat landscape
- What is a zero-day phishing attack? | Blog | Egress
Is your traditional email security solution protecting your company's communications? Zero-day attacks exploit these solutions, but protection is available.
- How do phishing attacks impact a company? | Report | Egress
Egress fighting phishing report reveals the % of businesses that have taken out cyber insurance, invested in forensic investigation in response to phishing.
- How do brand impersonation phishing attacks work? | Egress
Learn what brand impersonation attacks are, why they're difficult to stop, why companies need intelligent protection, and how Egress Defend can help.
- Spear phishing attacks: Top 7 signs | Phishing | Egress
Spear phishing attacks are a major cyber risk for businesses in the US. In this article, we explain what spear phishing is and what signs to look out for.
- How to spot a phishing link | Phishing | Egress
Phishing attacks are becoming more sophisticated and more common. In this article, we reveal how you can detect a phishing link and stay protected online.
- Don't let credential theft become business email compromise
Account takeover can easily turn into business email compromise. Follow our guide on the actions to take if you ever find yourself the victim of phishing.
- Defend against CEO fraud | How can I stop CEO fraud phishing?
Did you know that CEO fraud is on the rise? Learn effective strategies for CEO fraud prevention and safeguarding your organization from this cyber threat.
- What’s “double-barrel phishing” | Phishing | Egress
Double-barrel phishing is a clever phishing tactic - but there are ways to beat it. Find out everything you need to know here.
- What is an impersonation attack? | Phishing | Egress
Impersonation attacks are a prime example of a modern phishing scam. Learn how to recognise and prevent attacks.
- Ransomware explained | Phishing | Egress
Ransomware attacks don’t just affect big companies. Learn the basics about how ransomware represents a serious threat.
- Can ransomware epidemic be stopped? | Phishing | Egress
Ransomware is accelerating at an alarming pace. Learn how to break the kill chain and slow it down in our expert guide.
- What makes an anti-phishing solution intelligent? | Egress
There are plenty of anti-phishing solutions on the market - and many claim to offer intelligent security. But how can you tell which really are intelligent?
- Can you stop people clicking on phishing links? | Egress
All that cybersecurity training and people still click on malicious links within phishing emails. Frustrating, isn't it? Here's how to finally stop them.
- How to identify a phishing website | Phishing | Egress
20% of all employees are likely to click on phishing email links and, of those, 67% go on to enter their details on a phishing website. Check out Egress Defend!
- 5 Best Defenses Against Phishing Attacks | Phishing | Egress
In this article, we'll explore what phishing is and the methods cybercriminals use to get their hands on sensitive data.
- What is business email compromise (BEC)? | Phishing | Egress
In this article, we'll explore what business email compromise is, what signs to look out for and how you can prevent an attack.
- Guide to DMARC | Phishing | Egress
DMARC is an email authentication protocol that helps recipient domains verify who an email sender is who they say they are and are not spoofing a domain name.
- Examples of business email compromise (BEC) attacks | Egress
Business email compromise (BEC) is one of the most advanced, financially damaging forms of phishing. Here are some prominent BEC attacks in recent years.
- What is account takeover (ATO)? | Phishing | Egress
What exactly is account takeover? Find out more about this dangerous outcome of phishing and learn how to protect your business.
- What happens if I click a phishing link? | Phishing | Egress
Find out what you should do if you click a phishing link, learn the risks involved, and help boost your chances of spotting phishing links in the future.
- Three examples of business email compromise attacks | Egress
We've picked out three real-life examples that prove just how dangerous business email compromise (BEC) can be. Learn what happened and how to avoid being next.
- How account takeover (ATO) attacks happen | Egress
Account takeover (ATO) attacks can cause serious damage to a business before they're detected. Learn how they take place and how you can stop them.
- Stop phishing emails across all devices | Egress
Find out how Egress Defend makes sure your people protected from advanced phishing threats no matter what device they're working on, or where they're using it.
- The power to bulk remove phishing emails from inboxes | Egress
Egress Defend gives admins the power to both bulk remove emails from people's inboxes and create real-time teachable moments. Learn how in our latest guide.
- Can new US cybersecurity bills slow the rise of ransomware?
Ransomware is running wild. Will eight new cybersecurity bills aiming to protect US critical infrastructure be enough to slow it down?
- Ultimate Guide to Phishing | Egress
Read our ultimate guide to phishing to discover everything you need to know about phishing, from its impacts to immediate actions you can take to resist attacks
- Who are the top phishing targets in an organization? | Egress
Does phishing target everyone equally? Or are certain people more likely to be targeted? Find out what the data from our latest phishing report shows.
- Invoice fraud; Phishing attack | Egress
Worried about invoice fraud? We explain how invoice fraud is used in cybercrime and how intelligent email security tools can protect your business.
- Anti-phishing training with intelligent tech | Egress
Phishing attacks are hard to spot, and training doesn't seem to be helping. Learn why phishing training needs to be augmented with intelligent tech.
- How legal IT leaders responding to phishing threats | Egress
Legal organizations are key targets for cybercriminals. We explain why firms often fall victim to phishing threats and how legal IT leaders can respond.
- How are IT leaders responding to ransomware? | Egress
Ransomware can damage an organization in a way that continues to haunt it for years to come. So how are IT leaders preparing to avoid attacks?
- What and how to prevent ransomware | Phishing | Egress
Phishing emails are the primary method for delivering ransomware, learn here all about what & how to prevent these type of attacks.
- Learn all about business email compromise | Phishing | Egress
Don't let a phishing attack turn into business email compromise. Read our articles on the actions to take if you ever find yourself the victim of phishing.
- ATO, CEO Fraud & Impersonation attacks | Phishing | Egress
Account takeover (ATO), CEO fraud & impersonation attacks are all forms of phishing techniques to steal identities & propose significant threat to organisations
- Email Hacks & Scams | Phishing | Egress
The majority of people aren’t really aware of threats to the emails they send. Find out about email hacks and scams through are library of articles.
- Spear phishing, whaling, barrel phishing, smishing & vishing | Egress
Learn all you need to know about phishing subcategories such as spear phishing, whaling, barrel phishing, smishing, vishing, and quishing.
- Stop & Prevent phishing emails | Phishing | Egress
The number of phishing attempts is increasing, costing organizations millions of dollars to deal with phishing attacks.
- How to spot, identify & report phishing | Phishing | Egress
Phishing can have a huge impact on you, your employees, or your organization. That's why it's essential to report any suspicious emails that come your way.
- FS IT leaders respond to phishing threats | Egress
Financial services (FS) remain particularly vulnerable to phishing. A new survey reveals the extent of the problem and points to solutions.
- Cryptocurrency donations Ukraine crisis being exploited | Egress
Egress have uncovered a series of phishing emails impersonating official Ukrainian sources and tricking people into donating cryptocurrency.
- Sextortion phishing attacks up by 334% | Egress
Recent Egress threat intelligence shows that sextortion phishing attacks have risen by 334% since March 2022. Help your users to spot and avoid these emails.
- Three concerning zero-day exploits for sale on the dark web
Zero-day exploits are particularly dangerous as they target previously unknown vulnerabilities. Get the latest on three we’ve found for sale on the dark web.
- How phishing gangs weaponize the 24-hour news cycle | Egress
Learn how attackers choose the right news stories to weaponize and craft into targeted phishing campaigns against individuals and organizations.
- Why is phishing still an unsolved problem? | Egress
Everyone knows about phishing, but people keep falling for it. This article discusses why phishing is an unsolved problem and how to reduce risk.
- What's driving the increase in phishing attacks? | Egress
We spoke to three experts to determine what's driving the increase in phishing attacks. Learn what to watch out for and how to augment your defenses.
- Most concerning cyberattacks our experts have seen this year
From spear-phishing to sextortion to plain-and-simple exploitation of gaps in security, here are the most concerning cyberattacks of 2022.
- Which cyberthreats are keeping the experts up at night? | Egress
Some IT security risks are enough of a problem to keep the experts awake at night. Find out what they are – and why you should prepare yourself.
- How can we turn a hacker’s toolkit against them? | Egress
Egress threat researchers have analyzed the toolkits used to build countless phishing emails. Learn how we can turn this knowledge against the hackers.
- Crypto and phishing – how criminals are cashing in | Egress
Criminals are cashing in on the increasing popularity of crypto. There has been a significant rise in crypto phishing scams targeting users' online wallets.
- How do hackers choose their victims? | Egress
Reconnaissance is the first step an attacker takes. Learn how they discover which organizations and individuals to target with phishing.
- The AI arms race between attackers and defenders | Egress
An increasing number of cybercriminals are weaponizing AI to increase the efficiency of phishing attacks, data poisoning attacks, and ransomware attacks.
- The state of ransomware in 2022 | Egress
This article outlines the state of ransomware in 2022 and discusses how the ransomware arms race between attackers, defenders, and the government is developing.
- What tools do hackers use to weaponize emails?
Hackers use sophisticated tools created by technical cybercriminals to weaponize emails and perform social engineering attacks and steal sensitive information.
- Four ways scammers are exploiting the cost of living crisis
As the cost of living rises, scammers are finding new ways to exploit peoples' fear by pretending to offer free samples, grants, rebates, and support payments.
- The tools hackers use to evade email security
Once hackers have chosen their victims and planned their attack, these are the tools they use to evade your email security.
- Uber breach proves power of social engineering | Egress
Uber recently suffered a major breach due to social engineering – here’s what happened and the key lessons we can learn to prevent future attacks.
- MFA: It’s more vulnerable than you think
Multi-factor authentication can be a real asset to a modern business, but it’s important to know where its weaknesses lie.
- What is polymorphic phishing? | Egress
Polymorphic phishing is an advanced email phishing attack that tricks signature-based email security tools by making slight changes to email elements.
- Why attackers are impersonating IT security teams | Egress
Many attackers impersonate IT security teams to trick users into handing over information. Learn why it’s such a popular tactic and how to defend against it.
- Tesco impersonation attacks target citizens in cost of living crisis
Scammers have been impersonating supermarket chain Tesco in phishing attacks, in an attempt to cash in on the UK's cost of living crisis.
- Your phishing reporting loop could be broken
Recognizing phishing attempts is harder than it may seem. On average, users correctly identify 10% of phishing attempts and often mistake spam to be phishing.
- How does a payloadless phishing email work? | Egress
Cybercriminals are using payloadless phishing emails to trick victims into sharing information or making a payment. Here’s what you need to know.
- Seven different types of phishing payload | Egress
To keep your business safe, you need to understand what you’re up against. Here are the phishing payloads and scams you need to keep an eye out for.
- How flood attacks build fake trust and poison AI models
AI is a valuable cybersecurity tool – but it can be manipulated and turned against you. Learn how flood attacks build fake trust and poison your AI models.
- Netflix email impersonation attacks up by 78%
Netflix impersonation phishing emails are increasing in number. Here’s what they look like, how they work, and what you need to watch out for.
- Anti-phishing requirements in NYDFS regulation changes
Find out proposed amendments to NYDFS Cybersecurity Regulations, impacting email security requirements for New York organizations. Here’s what you need to know.
- Three real-life examples of invoice and payment fraud | Egress
These examples of invoice payment fraud show just how easy it is to be caught out by these scams. Find out what you need to do to keep your organization safe.
- How a business email compromise (BEC) attack plays out
Business email compromise (BEC) attacks typically involve an attacker impersonating a senior executive or vendor. They are one of the hardest attacks to detect.
- Five biggest supply chain compromise attacks of 2022 | Egress
Read about this year’s biggest supply chain attacks, the problems they caused, and how to prevent them in your business.
- Is your supply chain protected from phishing? | Egress
Supply chain attacks are a serious and widespread problem. If a vendor falls victim to a phishing attack, your organization could be affected too.
- How we flip the phishing quarantine model on its head | Blog
Not quarantining phishing emails helps organizations to detect more phishing attacks and improve security awareness and training for employees.
- Will hackers use AI chatbots to craft better phishing emails
New chatbots have the potential to upend everything from education to public discourse. Could they also prove a boon to scammers? Yes and no. Here’s why.
- Egress Defend – what we can learn from 2022 phishing trends
We've compiled a range of key phishing statistics and outline how you can utilize technology to keep your organization secure.
- Shein brand impersonation phishing emails up 128% in 2023
Egress’ Threat Intelligence team has detected a 128% increase in Shein brand impersonation emails since January 1st, 2023 compared with November 2022.
- How ransomware has evolved (with examples) | Phishing | Egress
From humble beginnings to board-level priority, ransomware costs businesses millions per incident. Use this guide to ransomware’s evolution to stay a step ahead
- How social engineering attacks work (with examples) | Egress
Social engineering phishing attacks try to trick people into giving up sensitive information or money. Here are some top tips to spot social engineering.
- Analyzing a real business email compromise attack
Egress’ threat analysts detected a phishing campaign that followed a successful account takeover (ATO) attack.
- Detecting AI-generated phishing emails with Egress Defend
Chatbots can be used to generate phishing emails. Whether written by AI or a human, Egress Defend uses the same detection capabilities.
- Graymail and its impact on cybersecurity | Egress
Graymail – It's not good and it’s not bad either, but it does fall in the gap between legitimate mail and spam. This is what makes it a potential cyber threat.
- Impersonation attacks leverage Silicon Valley Bank collapse
As news of Silicon Valley Bank’s (SVB) collapse continues to dominate the headlines, cybercriminals run phishing campaigns impersonating SVB
- New use of Emotet malware within Microsoft OneNote attachments
Emotet malware being used within Microsoft OneNote attachments, as cybercriminals evolve their attacks in attempts to avoid detection.
- 164% increase in tax-related phishing emails since Feb 2023
Find out why there has been a 164% increase in tax-related phishing emails since February 2023 and a 32% increase versus 2022 levels.
- What is a QR phishing (‘quishing’) attack?
Quishing attacks use QR codes to deliver a malicious payload. Understand how they work and how to stop them.
- The psychological impact of phishing attacks on your employees
As cybercriminals continue to exploit human vulnerabilities through social engineering, the impact on employee stress levels is a growing concern that cannot be ignored.
- What is OSINT? | Phishing | Egress
As a valuable tool for gathering intelligence, OSINT can provide insight into a variety of topics, including current events, criminal activity, and potential security threats.
- The cost of ransomware attacks
Cybersecurity and IT leaders must address ransomware attacks with appropriate security controls (such as integrated cloud email security (ICES) to stop phishing attacks) and governance policies.
- Handling a business email compromise attack: What to do
Find out how to respond after a business email compromise attack and learn essential steps to stop business email compromise in the future. Learn more.
- Integrated cloud email security (ICES) vs secure email gateway (SEG)
It is important for organizations to implement the right email security for their needs, protecting them from both inbound and outbound threats.
- How bad actors use phishing to weaponize out-of-office replies
Correlation between scouting attacks and impersonation-based phishing emails reveals how cybercriminals use out-of-office replies to target organizations.
- M365 log in page hijack attack | Egress
Get the latest insights from the Egress Threat Intelligence team about this advanced phishing attack that uses HTML smuggling to Microsoft 365 harvest credentials.
- Phishing Threat Trends Report Insights
Key insights from the 2023 Phishing Threat Trends Report, compiled by the Egress Threat Intelligence Team
- Lessons from Chris Novak and Perry Carpenter
It’s time to adapt with the most important takeaways from Chris Novak and Perry Carpenter, speaking at the 2023 Human Risk Summit.
- Phishing emails up 237% in run-up to Black Friday
These are the tactics and techniques that cybercriminals are using in 2023 to defraud Black Friday and Cyber Monday shoppers
- TEMU impersonation attacks up 112% in three months
Cybercriminals are never far behind the latest trends and phishing emails impersonation the most downloaded app TEMU are getting more and more common.
- Emerging threat: Salesforce-based attacks up by 109% in 2024
We’ve seen a 109% increase in the number of Salesforce attacks since the start of 2024. Here’s all you need to know.
- Venmo threat sees increase in fraudulent payment requests
Venmo payment request fraud is on the rise and cybercriminals are leveraging brand subscriptions to trick users into making these payments.
- Love bait: How AI-driven phishing scams are hijacking Valentine's Day
Romance-based impersonation attacks are on the rise during the lead up to Valentine’s Day, and cybercriminals are leveraging artificial intelligence to make attacks more convincing.
- Unraveling the truth: Debunking three common phishing detection myths
Discover why traditional phishing detection methods may no longer be effective in today's evolving threat landscape as we debunk common myths.
- The evolution of QR code phishing: Unmasking new 'quishing' tactics
Since 2021, QR code phishing, or 'quishing,' has skyrocketed. Explore the latest tactics cybercriminals use and the advanced technologies being deployed to defend against these attacks. Find out why quishing is on the rise and how to stay protected.
- Exploiting EUROs excitement: Phishing attacks surge using major brands
Discover how cybercriminals are exploiting the excitement of UEFA EUROs 2024 to launch sophisticated phishing attacks impersonating major brands like Booking.com, Lufthansa, and Uber. Learn about the tactics used, the brands being impersonated, and how to protect your organization from these threats.
- Video: Protect against advanced phishing with Egress Defend | Egress
Stop targeted email attacks with Egress Defend.
- Creating noise: The emerging obfuscation technique designed to evade email security NLP detection capabilities
Discover how threat actors are using advanced obfuscation techniques to bypass NLP-based email security. Our research dives into emerging phishing attacks, revealing tactics like break lines, appended signatures, and legitimate links to evade detection.
- Emerging Accelerated Mobile Page (AMP) obfuscation technique used in over 7% of global phishing attacks, exploiting TikTok, Google, and Instagram
Explore the rise of AMP obfuscation in phishing attacks, with over 7% of global campaigns using AMP links to disguise malicious URLs. Egress’ Threat Intelligence Team reveals how attackers exploit trusted brands like TikTok, Google, and Instagram to evade detection and deceive users.