New phish in town – Browser-in-the-browser attack

‘Browser in a browser’: Phishing technique simulates pop-ups to exploit users. A security researcher has demonstrated the potential dangers from a phishing technique that involves simulating a pop-up window in order to spoof a legitimate domain. Nowcomm’s SOC analyst, Ervin demonstrates the techniques used in this type of attacks.

For advice on how to defend your organisation against these types of attacks contact Nowcomm.

Related posts

Cybersecurity lessons learnt from 2022 and the New Year’s security resolutions you should stick to

12 new year’s resolutions for collaboration and hybrid working in 2023

What are the main reasons for poor WiFi in schools and how can you improve it?

How WiFi in schools is transforming the learning experience

All about the Department for Education Connect the Classroom initiative

Cloud Telephony for Public Sector

How is SASE Helping the Public Sector?

Hybrid workers are here to stay, but is your business ready?

How does call recording and analytics improve customer services?

A Quick Guide to Zero Trust Security

New phish in town – Browser-in-the-browser attack

Dubber on Webex – Call Insights and AI for Public Sector

Deep dive into the world of Secure Cloud Analytics

How is contact centre technology transforming the customer experience?

Exploits our radar: Apache Log4j

Cisco Secure Endpoint vs Microsoft Defender: Which one to choose?

From nice-to-have to business essential: why security matters for every business

How the adoption of digital accelerated collaboration technology

Active hacker groups on our radar: DarkSide

PrintNightmare Windows Print Spooler attack vs Cisco Endpoint Protection (AMP)