cyberhoot.com Open in urlscan Pro
54.156.140.113  Public Scan

Submitted URL: http://secure-lumisource.com/zrvdwmtum2c0ehp4
Effective URL: https://cyberhoot.com/training/phishing-attacks/
Submission: On March 20 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://cyberhoot.com/

<form role="search" method="get" class="search-form" action="https://cyberhoot.com/">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="search" class="search-field" placeholder="Search …" value="" name="s">
  </label>
  <input type="submit" class="search-submit" value="Search">
</form>

Text Content

Skip to content
Menu
 * Businesses
 * Partners
 * Pricing
 * vCISO
 * 
   Resources
   * API
   * Blog
   * Contact Us
   * Cybrary
   * Features
   * HowTo
   * Referral Program
 * Login & Trainings
 * Sign up now


YOU’VE BEEN PHISHED!

Posted on December 17, 2019February 17, 2023 by Craig Taylor

But please don’t panic.  This was only a test.

Before landing here, you clicked on a phishing email sent by your company to
test you.  This is important because, had this been a hacker attack, your
credentials could have been stolen, malware implanted on your machine, leading
to a ransomware attack or business email compromise.  Both are really bad
scenarios.

Our company requires everyone to remain vigilante when examining email.  Be on
the look out for these tell-tale signs of a phishing attack:

 1. Sender: is the sender correct?  Be careful to check for look-alike domain
    names off by just 1 letter. For more information on this attack visit this
    webpage on Typosquatting.
 2. Subject: The subject is not always a dead give-away for a phishing attack. 
    But look for subjects that are unexpected, too good to be true, urgent, or
    contain spelling or grammatical errors. These indicate a potential phishing
    attack.
 3. Greeting: watch out for generic greetings such as Dear Sir/Madam, or Valued
    Customer. These are usually indications you’re being phished.
 4. Spelling, Punctuation, and Grammar: English is sometimes the second language
    of attackers. Most legitimate companies rigorously check for errors with
    spelling, punctuation and grammar.  You need to be on the look out for
    errors here.
 5. Urgency and Emotionality: hackers know that people make bad decisions when
    time-pressured or in emotionally charged situations.  Therefore, their
    phishing emails come emotionally charged and with urgency.  If you see this,
    be wary as you might be under attack.
 6. Malicious Links: some phishing emails are designed to steal your
    credentials.  The phish is to convince you to click the link to a common
    vendor’s website, where you will attempt to login.  The problem is, the
    website is a phishing site that will steal your credentials and if its well
    constructed forward you to the real vendors website after capturing your
    login attempt.
 7. Attachments: Last, but not least are the attachments that come in email. 
    Some have dangerous file extensions such as .bat or .exe or macro-enabled
    office files (.docm or .xlsm).  Others have safe looking extensions such as
    a PDF, but when you open the PDF to review your invoice, it has a link to
    the “invoicing website”.  Again this is a ruse. They are seeking to steal
    your credentials when you try to log into that fake invoice website.

If you learn these seven ways to spot and avoid phishing emails, you’ll be
cybersecurity and ready to face the hacker attacks that reach our inboxes every
day.  Be safe and stay vigilant.




ADDITIONAL TRAINING ON SPOTTING PHISHING ATTACKS:

Spear-Phishing attacks

Spotting and Avoiding Phishing Attacks

Share this on your social networks. Help Friends, Family, and Colleagues become
more aware and secure.
FacebookTwitterLinkedInEmailPrint
Posted in TrainingTagged #Phishing, #Training, PhishingAttacks


SEARCH

Search for:


CYBERHOOT

Legal Corporation HQ

Smyrna, DE

Field Offices

Portsmouth, NH


PRODUCTS

 * Features
 * Businesses
 * Individuals
 * Partners
 * Referral Program


CONTACT

 * Contact Us
 * HowTo (Self Help)
 * Privacy Policy
 * Terms Of Service

 * facebook
 * twitter
 * youtube
 * rss


RESOURCES

 * Blog
 * Case Study – MSP
 * Case Study – SMB
 * Testimonials
 * Cybrary
 * InfoGraphics
 * Newsletters
 * Press Releases
 * Video Training Library


Copyright © 2023 CyberHoot

✓
Thanks for sharing!
AddToAny
More…