The phishing-as-a-service kit from Sneaky Log creates fake authentication pages to farm account information, including two-factor security codes.
business email compromise

Microsoft’s Security Copilot Enters General Availability
Microsoft Security Copilot, also referred to as Copilot for Security, will be in general availability starting April 1, the company...more

Sekoia: Latest in the Financial Sector Cyber Threat Landscape
A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the...more

How business email compromise attacks emulate legitimate web services to lure clicks
New BE cyberattacks use phishing with a legitimate Dropbox link as a lure for malware and credentials theft. Image: Adobe...more

Israel-based threat actors show growing sophistication of email attacks
Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur...more

BECs double in 2022, overtaking ransomware
A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing,...more

Business email compromise attacks now targeting people via SMS messages
No longer limited to email, BEC attacks are hitting users through text messages in an attempt to steal money or...more

Secure corporate emails with intent-based BEC detection
Image: Adobe Stock In a business email compromise, generally, the attacker uses emails and social engineering techniques to have one...more