whaling Tag

Phishing has been a profitable attack vector for criminals for more than 20 years. The reasons for its success are quite diverse. Throughout this blog, we will provide an overview of different types of phishing, the techniques that are used in phishing attempts and how...

Preventing Business Email Compromise is critical for organizations everywhere. Here’s a quick overview of this malicious email-based threat and how to stop it. Sometimes referred to as “whaling” since it specifically targets or impersonates an organization’s biggest fish, in a BEC campaign, the attacker sends an...