PhishFlagger

Phishing Protection

Latest Phishing News

  Subscribe to PhishFlagger News

New report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalate

New report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalate

New report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalate

New report reveals a rise in phishing attacks, as commodity campaigns, advanced persistent threats, and impersonation attacks escalate

Access Now and Russian civil society victims help take down Russian phishing infrastructure

Access Now and Russian civil society victims help take down Russian phishing infrastructure

Access Now and Russian civil society victims help take down Russian phishing infrastructure

Access Now and Russian civil society victims help take down Russian phishing infrastructure

Businesses are being hit with more mobile phishing than ever before

Businesses are being hit with more mobile phishing than ever before

Businesses are being hit with more mobile phishing than ever before

Businesses are being hit with more mobile phishing than ever before

It's Estimated That 91% Of Cyber Attacks Begin With Phishing Emails

It's Estimated That 91% Of Cyber Attacks Begin With Phishing Emails

It's Estimated That 91% Of Cyber Attacks Begin With Phishing Emails

It's Estimated That 91% Of Cyber Attacks Begin With Phishing Emails

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Cybercriminals Exploit HTTP Headers for Credential Theft via Large-Scale Phishing Attacks

Is That Text Message From Your Bank Legit? How to Detect and Avoid SMS Phishing Scams

Is That Text Message From Your Bank Legit? How to Detect and Avoid SMS Phishing Scams

Is That Text Message From Your Bank Legit? How to Detect and Avoid SMS Phishing Scams

Is That Text Message From Your Bank Legit? How to Detect and Avoid SMS Phishing Scams

Honest phishing: the alert is fake, the attack is real

Honest phishing: the alert is fake, the attack is real

Honest phishing: the alert is fake, the attack is real

Honest phishing: the alert is fake, the attack is real

Phishing Remains Top Cyber Threat Despite Drop in Incidents

Phishing Remains Top Cyber Threat Despite Drop in Incidents

Phishing Remains Top Cyber Threat Despite Drop in Incidents

Phishing Remains Top Cyber Threat Despite Drop in Incidents

Google, Facebook and Amazon hit hard by phishing in early 2024

Google, Facebook and Amazon hit hard by phishing in early 2024

Google, Facebook and Amazon hit hard by phishing in early 2024

Google, Facebook and Amazon hit hard by phishing in early 2024

$55 Million in DAI Stolen From This Crypto Whale via Phishing Attack

$55 Million in DAI Stolen From This Crypto Whale via Phishing Attack

$55 Million in DAI Stolen From This Crypto Whale via Phishing Attack

$55 Million in DAI Stolen From This Crypto Whale via Phishing Attack

4014 Phishing links becoming bigger threat than email attachments

4014 Phishing links becoming bigger threat than email attachments

4014 Phishing links becoming bigger threat than email attachments

4014 Phishing links becoming bigger threat than email attachments

4012 University of Toronto - Citizen Lab Rivers of Phish Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe/ Access Now Spear-phishing cases from Eastern Europe in 2022-2023 and 2024

4012 University of Toronto - Citizen Lab Rivers of Phish Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe/ Access Now Spear-phishing cases from Eastern Europe in 2022-2023 and 2024

4012 University of Toronto - Citizen Lab Rivers of Phish Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe/ Access Now Spear-phishing cases from Eastern Europe in 2022-2023 and 2024

4012 University of Toronto - Citizen Lab Rivers of Phish Sophisticated Phishing Targets Russia’s Perceived Enemies Around the Globe/ Access Now Spear-phishing cases from Eastern Europe in 2022-2023 and 2024

Russia launching more sophisticated phishing attacks, new report finds

Russia launching more sophisticated phishing attacks, new report finds

Russia launching more sophisticated phishing attacks, new report finds

Russia launching more sophisticated phishing attacks, new report finds

4010 One of The Biggest Data Breaches Ever Leaks 2.9 Billion Records - Here’s What You Need to Know!

4010 One of The Biggest Data Breaches Ever Leaks 2.9 Billion Records - Here’s What You Need to Know!

4010 One of The Biggest Data Breaches Ever Leaks 2.9 Billion Records - Here’s What You Need to Know!

4010 One of The Biggest Data Breaches Ever Leaks 2.9 Billion Records - Here’s What You Need to Know!

Darktrace report: 56% of phishing emails bypass security checks

Darktrace report: 56% of phishing emails bypass security checks

Darktrace report: 56% of phishing emails bypass security checks

Darktrace report: 56% of phishing emails bypass security checks

The Alarming Surge Of Lateral Phishing – Are We All Just Sitting Ducks?

The Alarming Surge Of Lateral Phishing – Are We All Just Sitting Ducks?

The Alarming Surge Of Lateral Phishing – Are We All Just Sitting Ducks?

The Alarming Surge Of Lateral Phishing – Are We All Just Sitting Ducks?

This Android SMS phishing campaign steals your money AND wipes your data

This Android SMS phishing campaign steals your money AND wipes your data

This Android SMS phishing campaign steals your money AND wipes your data

This Android SMS phishing campaign steals your money AND wipes your data

EchoSpoofing: Lessons Learned from Proofpoint Email Phishing Exploit

EchoSpoofing: Lessons Learned from Proofpoint Email Phishing Exploit

EchoSpoofing: Lessons Learned from Proofpoint Email Phishing Exploit

EchoSpoofing: Lessons Learned from Proofpoint Email Phishing Exploit

Microsoft OneDrive users in India could be tricked into installing a malware this way

Microsoft OneDrive users in India could be tricked into installing a malware this way

Microsoft OneDrive users in India could be tricked into installing a malware this way

Microsoft OneDrive users in India could be tricked into installing a malware this way

Microsoft 365 users targeted by phishers abusing Microsoft Forms

Microsoft 365 users targeted by phishers abusing Microsoft Forms

Microsoft 365 users targeted by phishers abusing Microsoft Forms

Microsoft 365 users targeted by phishers abusing Microsoft Forms

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

Proofpoint Platform Exploited to Send Millions of Spoofed Phishing Emails

White House Offers Prize Money for Hacker-Thwarting AI

White House Offers Prize Money for Hacker-Thwarting AI

White House Offers Prize Money for Hacker-Thwarting AI

White House Offers Prize Money for Hacker-Thwarting AI

CISA advised individuals to "avoid clicking on phishing emails or suspicious links," as these can lead to email compromises and other scams.

CISA advised individuals to "avoid clicking on phishing emails or suspicious links," as these can lead to email compromises and other scams.

CISA advised individuals to "avoid clicking on phishing emails or suspicious links," as these can lead to email compromises and other scams.

CISA advised individuals to "avoid clicking on phishing emails or suspicious links," as these can lead to email compromises and other scams.

WARNING: Malicious Hackers Exploiting CrowdStrike Outage!

WARNING: Malicious Hackers Exploiting CrowdStrike Outage!

WARNING: Malicious Hackers Exploiting CrowdStrike Outage!

WARNING: Malicious Hackers Exploiting CrowdStrike Outage!

CrowdStrike outage fuels rise in phishing scams, experts argue

CrowdStrike outage fuels rise in phishing scams, experts argue

CrowdStrike outage fuels rise in phishing scams, experts argue

CrowdStrike outage fuels rise in phishing scams, experts argue

Phishing Landscape 2024: An Annual Study of the Scope and Distribution of Phishing

Phishing Landscape 2024: An Annual Study of the Scope and Distribution of Phishing

Phishing Landscape 2024: An Annual Study of the Scope and Distribution of Phishing

Phishing Landscape 2024: An Annual Study of the Scope and Distribution of Phishing

Cybersecurity Funding Jumps 144% In Q2

Cybersecurity Funding Jumps 144% In Q2

Cybersecurity Funding Jumps 144% In Q2

Cybersecurity Funding Jumps 144% In Q2

Google is close to making its biggest acquisition ever

Google is close to making its biggest acquisition ever

Google is close to making its biggest acquisition ever

Google is close to making its biggest acquisition ever

Hack3d: The Web3 Security Quarterly Report - Q2 + H1 2024

Hack3d: The Web3 Security Quarterly Report - Q2 + H1 2024

Hack3d: The Web3 Security Quarterly Report - Q2 + H1 2024

Hack3d: The Web3 Security Quarterly Report - Q2 + H1 2024

Booking.com reports 900% surge in travel scams

Booking.com reports 900% surge in travel scams

Booking.com reports 900% surge in travel scams

Booking.com reports 900% surge in travel scams

A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks.

A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks.

A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks.

A newly discovered security vulnerability allows attackers to impersonate Microsoft corporate email accounts, significantly increasing the risk of phishing attacks.

Phishing attack hits L.A. County public health agency, jeopardizing 200,000-plus residents’ personal info

Phishing attack hits L.A. County public health agency, jeopardizing 200,000-plus residents’ personal info

Phishing attack hits L.A. County public health agency, jeopardizing 200,000-plus residents’ personal info

Phishing attack hits L.A. County public health agency, jeopardizing 200,000-plus residents’ personal info

The Brands and Industries that Phishing Scammers Impersonate the Most

The Brands and Industries that Phishing Scammers Impersonate the Most

The Brands and Industries that Phishing Scammers Impersonate the Most

The Brands and Industries that Phishing Scammers Impersonate the Most

Cybercriminals and AI: Not Just Better Phishing

Cybercriminals and AI: Not Just Better Phishing

Cybercriminals and AI: Not Just Better Phishing

Cybercriminals and AI: Not Just Better Phishing

US, UK, and India lead in phishing attempts in 2023, reports Zscaler ThreatLabz

US, UK, and India lead in phishing attempts in 2023, reports Zscaler ThreatLabz

US, UK, and India lead in phishing attempts in 2023, reports Zscaler ThreatLabz

US, UK, and India lead in phishing attempts in 2023, reports Zscaler ThreatLabz

Phishing scam reports to the Better Business Bureau nearly doubled in 2023

Phishing scam reports to the Better Business Bureau nearly doubled in 2023

Phishing scam reports to the Better Business Bureau nearly doubled in 2023

Phishing scam reports to the Better Business Bureau nearly doubled in 2023

What is spear phishing? Examples, tactics, and techniques

What is spear phishing? Examples, tactics, and techniques

What is spear phishing? Examples, tactics, and techniques

What is spear phishing? Examples, tactics, and techniques

Crypto companies suffer supply chain email breach, users likely to face series of phishing scams

Crypto companies suffer supply chain email breach, users likely to face series of phishing scams

Crypto companies suffer supply chain email breach, users likely to face series of phishing scams

Crypto companies suffer supply chain email breach, users likely to face series of phishing scams

AI Will Increase the Quantity—and Quality—of Phishing Scams

AI Will Increase the Quantity—and Quality—of Phishing Scams

AI Will Increase the Quantity—and Quality—of Phishing Scams

AI Will Increase the Quantity—and Quality—of Phishing Scams

HR & IT emails top phishing attacks, KnowBe4 report reveals

HR & IT emails top phishing attacks, KnowBe4 report reveals

HR & IT emails top phishing attacks, KnowBe4 report reveals

HR & IT emails top phishing attacks, KnowBe4 report reveals

Tech Companies Announce A New Coalition To Fight Online Fraud & Pig Butchering Scams

Tech Companies Announce A New Coalition To Fight Online Fraud & Pig Butchering Scams

Tech Companies Announce A New Coalition To Fight Online Fraud & Pig Butchering Scams

Tech Companies Announce A New Coalition To Fight Online Fraud & Pig Butchering Scams

Report Reveals 341% Rise in Advanced Phishing Attacks

Report Reveals 341% Rise in Advanced Phishing Attacks

Report Reveals 341% Rise in Advanced Phishing Attacks

Report Reveals 341% Rise in Advanced Phishing Attacks

Phishing statistics that will make you think twice before clicking

Phishing statistics that will make you think twice before clicking

Phishing statistics that will make you think twice before clicking

Phishing statistics that will make you think twice before clicking

A Breakdown of Today’s Phishing Epidemic

A Breakdown of Today’s Phishing Epidemic

A Breakdown of Today’s Phishing Epidemic

A Breakdown of Today’s Phishing Epidemic

What is Smishing? SMS phishing explained

What is Smishing? SMS phishing explained

What is Smishing? SMS phishing explained

What is Smishing? SMS phishing explained

Record Number of Mobile Phishing Attacks in 2022

Record Number of Mobile Phishing Attacks in 2022

Record Number of Mobile Phishing Attacks in 2022

Record Number of Mobile Phishing Attacks in 2022

Phishing Scams Growing More Sophisticated, Finra Says

Phishing Scams Growing More Sophisticated, Finra Says

Phishing Scams Growing More Sophisticated, Finra Says

Phishing Scams Growing More Sophisticated, Finra Says

Cybercriminals getting more creative with phishing attacks

Cybercriminals getting more creative with phishing attacks

Cybercriminals getting more creative with phishing attacks

Cybercriminals getting more creative with phishing attacks

Zscaler Report Reveals 50% Annual Surge in Global Phishing Attacks

Zscaler Report Reveals 50% Annual Surge in Global Phishing Attacks

Zscaler Report Reveals 50% Annual Surge in Global Phishing Attacks

Zscaler Report Reveals 50% Annual Surge in Global Phishing Attacks

Phishing FAQ: How to Spot Scams and Stop Them in Their Tracks

Phishing FAQ: How to Spot Scams and Stop Them in Their Tracks

Phishing FAQ: How to Spot Scams and Stop Them in Their Tracks

Phishing FAQ: How to Spot Scams and Stop Them in Their Tracks

Email scams vs Phishing - is there a difference?

Email scams vs Phishing - is there a difference?

Email scams vs Phishing - is there a difference?

Email scams vs Phishing - is there a difference?

UPS discloses data breach after exposed customer info used in SMS phishing

UPS discloses data breach after exposed customer info used in SMS phishing

UPS discloses data breach after exposed customer info used in SMS phishing

UPS discloses data breach after exposed customer info used in SMS phishing

Bored Ape NFTs Worth $135K Stolen by Prolific Phishing Thief

Bored Ape NFTs Worth $135K Stolen by Prolific Phishing Thief

Bored Ape NFTs Worth $135K Stolen by Prolific Phishing Thief

Bored Ape NFTs Worth $135K Stolen by Prolific Phishing Thief

Someone pretended to be Hamilton police — it led to a fake story about cryptocurrency theft

Someone pretended to be Hamilton police — it led to a fake story about cryptocurrency theft

Someone pretended to be Hamilton police — it led to a fake story about cryptocurrency theft

Someone pretended to be Hamilton police — it led to a fake story about cryptocurrency theft

Over $765K worth of NFTs stolen after SIM swap attack on GutterCatGang

Over $765K worth of NFTs stolen after SIM swap attack on GutterCatGang

Over $765K worth of NFTs stolen after SIM swap attack on GutterCatGang

Over $765K worth of NFTs stolen after SIM swap attack on GutterCatGang

Coinbase Users Report Scams and Phishing Attacks on Twitter

Coinbase Users Report Scams and Phishing Attacks on Twitter

Coinbase Users Report Scams and Phishing Attacks on Twitter

Coinbase Users Report Scams and Phishing Attacks on Twitter

Phishing Scam Exposes Vulnerabilities: Man Indicted for Stealing $450,000 in Cryptocurrencies and NFTs

Phishing Scam Exposes Vulnerabilities: Man Indicted for Stealing $450,000 in Cryptocurrencies and NFTs

Phishing Scam Exposes Vulnerabilities: Man Indicted for Stealing $450,000 in Cryptocurrencies and NFTs

Phishing Scam Exposes Vulnerabilities: Man Indicted for Stealing $450,000 in Cryptocurrencies and NFTs

ChatGPT’s evil twin WormGPT is secretly entering emails, raiding banks

ChatGPT’s evil twin WormGPT is secretly entering emails, raiding banks

ChatGPT’s evil twin WormGPT is secretly entering emails, raiding banks

ChatGPT’s evil twin WormGPT is secretly entering emails, raiding banks

Deepfake Imposter Scams Are Driving a New Wave of Fraud

Deepfake Imposter Scams Are Driving a New Wave of Fraud

Deepfake Imposter Scams Are Driving a New Wave of Fraud

Deepfake Imposter Scams Are Driving a New Wave of Fraud

Cybersecurity Experts Warn of Growing Threat Landscape as Phishing Attacks Soar

Cybersecurity Experts Warn of Growing Threat Landscape as Phishing Attacks Soar

Cybersecurity Experts Warn of Growing Threat Landscape as Phishing Attacks Soar

Cybersecurity Experts Warn of Growing Threat Landscape as Phishing Attacks Soar

Phishing Emails Abusing QR Codes Surge

Phishing Emails Abusing QR Codes Surge

Phishing Emails Abusing QR Codes Surge

Phishing Emails Abusing QR Codes Surge

PHISHING GUIDANCE: STOPPING THE ATTACK CYCLE AT PHASE ONE

PHISHING GUIDANCE: STOPPING THE ATTACK CYCLE AT PHASE ONE

PHISHING GUIDANCE: STOPPING THE ATTACK CYCLE AT PHASE ONE