Phishing Alert - The Domain Name Renewal Scam

The PhishingBox team has recently noticed a surge in phishing scams related to renewing domain names, web/email hosting, etc., and we want to give some insights on ways to identify the scam and protect yourself from falling victim.

Apr 24, 2018

Phishing and the Verizon Data Breach Investigation Report

The Verizon Data Breach Investigation Report (DBIR) provides useful information related to information security. The information was obtained from a collaboration of many security organizations and vendors. The findings fro

Feb 15, 2018

New Position: Account Manager

We are accepting applications for a full-time Account Manager, to work alongside the existing sales team in Lexington, KY. Experience in sales is required. Technology or software sales experience is a plus, but not required.

Aug 18, 2017

APWG Phishing Activity Trends Report | 4th Quarter 2016

The APWG continues to refine its tracking and reporting methodology. APWG tracks and reports the number of unique phishing reports (e-mail campaigns) it receives, in addition to the number of unique phishing sites found. The APWG also tracks the number of unique phishing websites.

Mar 10, 2017

Ransomware Completely Shuts Down Ohio Town Government

In another interesting example of what happens when you don't manage your backups correctly, the Licking County government offices, including the police force, have been shut down by ransomware.

Feb 07, 2017

Social Engineering Attacks Keep Evolving

Internet fraud has been around for just about as long as the Internet itself. According to a Kaspersky Lab 2016 Report, each year, cybercriminals come up with new techniques and tactics to fool their potential victims.

Jan 13, 2017

Verizon Data Breach Investigations Report (DBIR) 2016

The 2016 Verizon Data Breach Investigations Report (DBIR) highlights key information related to social engineering.

Jan 02, 2017

Advanced Persistent Threat (APT) Kill-Chain

According to Netswitch Technology Management, the Advanced Persistent Threat (APT) kill-chain looks like the following:

Jul 17, 2016

The Six Steps of an APT Attack

To improve your cyber security and successfully prevent, detect and resolve advanced persistent threats, you need to know how APTs work:

Jul 01, 2016