Tag

Phishing

Explore in-depth articles about phishing attacks, including email phishing, spear phishing, smishing, and vishing. Learn how attackers craft deceptive messages, steal credentials, and compromise systems — and discover proven strategies to detect and block these threats.

posts

Cybersecurity Terms Explained

Cybersecurity Terms Explained: A No-Nonsense Guide

In May 2021, Colonial Pipeline paid a $4.4 million ransom after a single compromised password shut down fuel delivery across the U.S. East Coast. The post-incident reporting was filled with jargon — ransomware, threat actor, credential theft, attack vector — that left most non-technical readers glazing over. Here's

Carl B. Johnson Sep 16, 2021 7 min read
Malware

What Is Malware? A Security Pro's Real-World Guide

The Colonial Pipeline Attack Changed Everything In May 2021, a single compromised password led to the most disruptive cyberattack on U.S. critical infrastructure in history. DarkSide ransomware shut down Colonial Pipeline's 5,500-mile fuel system, triggering gas shortages across the eastern seaboard. The company paid a $4.

Carl B. Johnson Sep 16, 2021 7 min read
Types of Malware

Types of Malware: What's Actually Hitting Networks in 2021

Colonial Pipeline Was Just the Beginning In May 2021, a single compromised password shut down the largest fuel pipeline in the United States. Colonial Pipeline paid DarkSide operators $4.4 million in ransom. Fuel shortages rippled across the Southeast for days. That attack used just one of the many types

Carl B. Johnson Sep 16, 2021 7 min read
DNS Spoofing Attack

DNS Spoofing Attack: How Hackers Hijack Your Traffic

In April 2018, attackers hijacked the DNS records for Amazon's Route 53 service, redirecting traffic meant for MyEtherWallet.com to a malicious server in Russia. Users who typed the correct URL into their browsers still landed on a fake site. Within two hours, attackers stole roughly $150,000

Carl B. Johnson Sep 03, 2021 7 min read
Phishing

What Is Phishing? The Attack Behind 36% of Breaches

In March 2021, a massive phishing campaign impersonating Microsoft Office 365 hit over 10,000 mailboxes across the financial services sector in a single week. The emails were nearly flawless — correct logos, legitimate-looking sender domains, and urgent language about password expiration. Dozens of employees handed over their credentials before anyone

Carl B. Johnson Aug 31, 2021 7 min read
Fake Email

Fake Email: How to Spot, Stop, and Survive One

A Single Fake Email Cost Facebook and Google $120 Million Between 2013 and 2015, a Lithuanian man named Evaldas Rimasauskas sent a series of fake email messages to employees at Facebook and Google. He impersonated a legitimate hardware vendor, complete with forged invoices and contracts. By the time both companies

Carl B. Johnson Aug 31, 2021 7 min read
Phishing

Phishing: Why 36% of Breaches Start in Your Inbox

The Inbox Is the Front Door — And It's Wide Open According to the 2021 Verizon Data Breach Investigations Report, phishing is involved in 36% of all confirmed data breaches. That number jumped 11 percentage points from the year before. Let that sink in — more than a third of

Carl B. Johnson Aug 31, 2021 7 min read
Phishing Definition

Phishing Definition: What It Really Means in 2021

In March 2021, a single phishing email led to a credential theft incident at a European banking authority that exposed personal data from thousands of email accounts. The attack wasn't sophisticated. It didn't exploit some exotic zero-day vulnerability. It started with a convincing email and a

Carl B. Johnson Aug 25, 2021 7 min read
Phishing

Definition of a Phishing Attack: What It Really Looks Like

In July 2020, a handful of Twitter employees received phone calls from people claiming to be IT administrators. Those calls led to the compromise of 130 high-profile accounts — including Barack Obama, Elon Musk, and Apple — and a Bitcoin scam that netted over $100,000 in hours. The whole thing started

Carl B. Johnson Aug 25, 2021 7 min read
Spoofing

Spoofing Attacks: How Hackers Impersonate Trust

In July 2020, a seventeen-year-old in Florida used phone-based spoofing and social engineering to compromise internal Twitter tools, hijacking the verified accounts of Barack Obama, Elon Musk, Jeff Bezos, and Apple. The attackers impersonated IT staff during phone calls to Twitter employees, spoofing caller IDs to appear legitimate. Within hours,

Carl B. Johnson Aug 25, 2021 8 min read