-

BEC is Not an Email Attack. It is an Identity Attack
In most organizations, Business Email Compromise is still viewed as just another type of phishing attack aimed at sending a convincing email. In practice, this…
-

Telecom and Cybersecurity: A Strategic Partnership
In a world where phishing attacks, fraud, and impersonation increasingly originate from mobile devices and communication networks, telecom companies have become the first line of…
-

When Multi-Factor Authentication is No Longer Enough
For years, multi-factor authentication has been considered the most effective layer of defense against account takeover. Organizations invested heavily in deploying it, users got used…
-

The Real Damage Starts After the Phishing Email
In most organizations, phishing is still treated as a point-in-time incident: a malicious message gets through, a user clicks, a tool raises an alert, and…
-

What a Real Phishing Incident Looks Like in Practice
One of the most interesting things about real-world security incidents is that they almost never look the way people imagine. No alarms, no systems going…
-

Post-Click Panic vs Pre-Click Control
The moment an employee clicks a phishing link is not the beginning of the incident – it is the beginning of the pressure. From that…
-

The Illusion of Control in Modern Security Stacks
Most organizations today invest in an impressive security stack. More tools, more dashboards, more alerts. On paper, everything looks covered. In reality, this sense of…
-

Sharp Increase in Valentine’s Day Phishing and Scam Activity
Our research team, Team51, has identified a sharp rise in seasonal consumer scam activity ahead of Valentine’s Day. Starting in mid January, we observed a…