Recent Threats

Subscríbase a nuestro blog

Reciba información de relevancia para tu organización

Don’t lose the opportunity to checkout the latest news

Be the first to know about what is happening in the world

Fake window

Attackers can use pop-ups or iframes to simulate a real login to a page in order to trick the user and extract credentials.


Example of Office 365 phishing

The attackers try to impersonate an Office system, which attempts to get the victim to click on the alert details


Trademark impersonation

Spoofing occurs when a criminal impersonates a reputable company that you trust and uses this brand to trick you into revealing your confidential information. For example, a criminal might send you an email with a Google logo in the header posing as Google and asking for your password. Most people feel comfortable giving their password to a company like Google to click on the link in the email, enter their information and give it directly to the criminal.