Recent Threats
Subscríbase a nuestro blog
Reciba información de relevancia para tu organización
Fake window
Attackers can use pop-ups or iframes to simulate a real login to a page in order to trick the user and extract credentials.
Example of Office 365 phishing
The attackers try to impersonate an Office system, which attempts to get the victim to click on the alert details
Trademark impersonation
Spoofing occurs when a criminal impersonates a reputable company that you trust and uses this brand to trick you into revealing your confidential information. For example, a criminal might send you an email with a Google logo in the header posing as Google and asking for your password. Most people feel comfortable giving their password to a company like Google to click on the link in the email, enter their information and give it directly to the criminal.