cyberhoot.com
Open in
urlscan Pro
54.156.140.113
Public Scan
Submitted URL: http://secure-lumisource.com/zrvdwmtum2c0ehp4
Effective URL: https://cyberhoot.com/training/phishing-attacks/
Submission: On March 20 via manual from US — Scanned from DE
Effective URL: https://cyberhoot.com/training/phishing-attacks/
Submission: On March 20 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://cyberhoot.com/
<form role="search" method="get" class="search-form" action="https://cyberhoot.com/">
<label>
<span class="screen-reader-text">Search for:</span>
<input type="search" class="search-field" placeholder="Search …" value="" name="s">
</label>
<input type="submit" class="search-submit" value="Search">
</form>
Text Content
Skip to content Menu * Businesses * Partners * Pricing * vCISO * Resources * API * Blog * Contact Us * Cybrary * Features * HowTo * Referral Program * Login & Trainings * Sign up now YOU’VE BEEN PHISHED! Posted on December 17, 2019February 17, 2023 by Craig Taylor But please don’t panic. This was only a test. Before landing here, you clicked on a phishing email sent by your company to test you. This is important because, had this been a hacker attack, your credentials could have been stolen, malware implanted on your machine, leading to a ransomware attack or business email compromise. Both are really bad scenarios. Our company requires everyone to remain vigilante when examining email. Be on the look out for these tell-tale signs of a phishing attack: 1. Sender: is the sender correct? Be careful to check for look-alike domain names off by just 1 letter. For more information on this attack visit this webpage on Typosquatting. 2. Subject: The subject is not always a dead give-away for a phishing attack. But look for subjects that are unexpected, too good to be true, urgent, or contain spelling or grammatical errors. These indicate a potential phishing attack. 3. Greeting: watch out for generic greetings such as Dear Sir/Madam, or Valued Customer. These are usually indications you’re being phished. 4. Spelling, Punctuation, and Grammar: English is sometimes the second language of attackers. Most legitimate companies rigorously check for errors with spelling, punctuation and grammar. You need to be on the look out for errors here. 5. Urgency and Emotionality: hackers know that people make bad decisions when time-pressured or in emotionally charged situations. Therefore, their phishing emails come emotionally charged and with urgency. If you see this, be wary as you might be under attack. 6. Malicious Links: some phishing emails are designed to steal your credentials. The phish is to convince you to click the link to a common vendor’s website, where you will attempt to login. The problem is, the website is a phishing site that will steal your credentials and if its well constructed forward you to the real vendors website after capturing your login attempt. 7. Attachments: Last, but not least are the attachments that come in email. Some have dangerous file extensions such as .bat or .exe or macro-enabled office files (.docm or .xlsm). Others have safe looking extensions such as a PDF, but when you open the PDF to review your invoice, it has a link to the “invoicing website”. Again this is a ruse. They are seeking to steal your credentials when you try to log into that fake invoice website. If you learn these seven ways to spot and avoid phishing emails, you’ll be cybersecurity and ready to face the hacker attacks that reach our inboxes every day. Be safe and stay vigilant. ADDITIONAL TRAINING ON SPOTTING PHISHING ATTACKS: Spear-Phishing attacks Spotting and Avoiding Phishing Attacks Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure. FacebookTwitterLinkedInEmailPrint Posted in TrainingTagged #Phishing, #Training, PhishingAttacks SEARCH Search for: CYBERHOOT Legal Corporation HQ Smyrna, DE Field Offices Portsmouth, NH PRODUCTS * Features * Businesses * Individuals * Partners * Referral Program CONTACT * Contact Us * HowTo (Self Help) * Privacy Policy * Terms Of Service * facebook * twitter * youtube * rss RESOURCES * Blog * Case Study – MSP * Case Study – SMB * Testimonials * Cybrary * InfoGraphics * Newsletters * Press Releases * Video Training Library Copyright © 2023 CyberHoot ✓ Thanks for sharing! AddToAny More…