Learn how attackers abused Zoom and ConnectWise ScreenConnect to send fake SSA alerts and trick users in a sophisticated phishing attack.
Phishing

From phishing to ransomware: How Kaseya 365 User protects your SaaS apps
SaaS applications, such as Microsoft 365 and Google Workspace, power nearly every aspect of today’s digital operations. However, as businessesRead More

Report: Nearly 70% of businesses expect a phishing attack in 2026
The cyberthreat landscape is evolving at breakneck speed. The challenges businesses face, the way budgets are allocated and the expectationsRead More

Common phishing tactics that put businesses at risk
Understand the most common phishing attacks, such as business email compromise, spear phishing and brand impersonation, and learn how to defend against them.

What to Do if You Respond to a Phishing Email
Follow these steps and best practices to help employees and organizations mitigate phishing attacks that may result from responding to a phishing email.

The History of Phishing
Explore the history of phishing including how it originated, why it is spelled with a “ph”, how techniques have evolved over time, and other interesting facts.

A Guide to Phishing Incident Response
Phishing incident response pertains to strategies and procedures that should be followed in the event of a phishing attack. Learn how to plan and steps to take.

The Worst Phishing Attacks in History
Phishing is at the root of many cyberattacks. Learn about 5 of the worst phishing attacks in history, how they happened, and the devastating impact they had.

What Is the Goal Behind Phishing Emails?
The goal behind phishing emails is to coax a victim into taking an action that is beneficial for the bad actor. Learn more about motives and techniques used.
