Phishing
Latest about Phishing

New phishing campaign exploits Microsoft’s legacy ADFS identity solution
By Solomon Klappholz published
News Researchers at Abnormal Security have warned of a new phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS) secure access system.

Phishing campaign targets developers with fake CrowdStrike job offers
By Solomon Klappholz published
News Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike

What is phishing?
By Clare Hopping last updated
In-depth From banking scams to industrial espionage, we look at why phishing is so lucrative

Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachments
By Solomon Klappholz published
News Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months.

How hackers are using legitimate tools to distribute phishing links
By Solomon Klappholz published
News Research indicates 2024 has ushered in a new era of phishing where threat actors have become increasingly adept at concealing their malicious links

2024 State of the phish report
By ITPro last updated
Whitepaper Risky actions, real-world threats and user resilience in an age of human-centric cybersecurity

Cloud security fears, rising costs, privacy concerns?
By ITPro published
Whitepaper The factors driving the demand for on-premises infrastructure

Advanced email security
By ITPro published
Whitepaper Protect against advanced email threats, streamline operations, and get actionable visibility into people risk and your threat landscape
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.