fbpx
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

cybersecurity
education
€ EUR
  • $ USD
  • € EUR

“Dear User”: Sorting Real Emails from Socially Engineered Phishing Attacks

With sophisticated socially engineered phishing attacks on the rise, it’s hard to tell which messages in your inbox are safe. In this video demo, cybersecurity expert Paula Januszkiewicz determines whether a suspicious email she received is really an attempt to steal her credentials.

Do you know how many people take the bait? Statistics are alarming. Take a look like Paula is analyzing her email load and #staycqure.

As Paula’s investigation gets underway, she discovers a link between the timing and contents of the email and an event that occurred in her real life. If the message is a cyber-attack, the threat actor has done their homework.

The email appears to be sent from a car rental firm Avis, but Paula finds several tell-tale signs that the company may have been spoofed. When she takes a closer look at the logo, email address, formatting and the way that the message is worded, things start to smell a bit phishy.

Suspecting that the pdf document attached to the email may be dangerous, Paula analyzed it with a security tool. The results revealed the exploitation of a vulnerability in Adobe. Had Paula opened the pdf in Adobe, the hacker who sent the email would have been able to establish a connection with her machine.

Remember always to evaluate the messages you receive, even the ones that pass through anti-phishing filters.

Do you want more phishing in action? Take new course from CQURE experts to created for all who want take a deep dive into social engineering and phishing.

Social Engineering and Phishing Mastery

 

You may also be interested in: