threat-intelligence-insights

Threats From Within: The Out of Office Reply

By Robert McDaniel As the guy who sends out the marketing emails at Cyveillance (yes, I’m THAT ...
threat-intelligence-insights

ICYMI: Our Most Popular Blog Posts of 2014

  2014 was another remarkable year in information security. In case you’ve missed any ...
phishing

What Do Martha Stewart and Russian Hackers Have in Common?

No, it’s not their mutual love of baking. About 10 years ago, Martha Stewart allegedly received ...
phishing

Are Some Parts of the Web Especially Likely to Host a Phishing Attack?

We recently shared intelligence about the phishing threat based on real attacks Cyveillance saw ...
threat-intelligence-insights

Phishing Scams Still Work Nearly Half the Time: Here’s Why

  Do you know anyone who has been the victim of a phishing scheme? Have you ever accidentally ...
phishing

Which Government Websites Host the Most Phishing Attacks?

Last month we shared some data from a year's worth of collected phishing URLs. In that post, we ...
phishing

Alexa Scores Can Be Used to Predict Whether a URL is Part of a Phishing Attack

Cyveillance is an enthusiastic Premium sponsor and Steering Committee member of Anti-Phishing ...
threat-intelligence-insights

New Voicemail From Romania

By Robert Simmons, Cyveillance Security Manager and Sr. Technologist There's a new variant on the ...
phishing

Recent Data Breaches, Targeted Attacks Show Two Sides of Phishing

Hardly a day passes without an announcement of yet another data breach or targeted attack. P. F. ...
phishing

Behind the Scenes of a Failed Phishing Attempt

One of our customers recently asked us to analyze a phishing email claiming to be from Wells Fargo ...