BLOG

Top 5 Reasons InfoSec Needs to Care About Social Networks

InfoSec and social networks overlap more than you might imagine. What are the top 5 reasons InfoSec cares about social…

learn more
linkedin phishing
BLOG

Vevo Hacked Via LinkedIn Phishing Campaign, Over 3TB of Sensitive Data Exposed

LinkedIn phishing has claimed a new victim. On September 15th, streaming service Vevo disclosed a massive data breach, to the tune…

learn more
social media scams
BLOG

Social Media Scams 101: What You Need to Know

In recent years, social media has become a hotbed for scam activity. Here's who they go after any why and…

learn more
BLOG

The Anatomy of an Attack: An In-Depth Look at 4 Social Media Threats

The attack chain has changed. In the wake of the social media revolution, cybercriminals exploit businesses and their customers at…

learn more
business threats
BLOG

3 Business Threats to Watch Out for on Social Media

More exposure on social media equals more ROI. But what kinds of business threats do marketers need to be on…

learn more
BLOG

Slack Hack Targets Crypto Community with Devastating Scam

The cryptocurrency investment platform Enigma had its Slack channels compromised by scammers, resulting in a half million in losses.

learn more
BLOG

HBO and Game of Thrones Social Media Accounts Compromised

HBO's security woes went from bad to worse when the official HBO and Game of Thrones Twitter & Facebook accounts…

learn more
spearphishing
BLOG

COBALT GYPSY: Spearphishing Corporate Employees on Social Media

Attackers, dubbed COBALT GYPSY, used a fake persona named Mia Ash to socially engineer their victims. Read More

learn more
impersonated executives
BLOG

How To Spot a Social Engineering Profile on Social Media

Social media has lowered the barriers to social engineering and building fraudulent accounts to next to zero. All it takes…

learn more
BLOG

Top Talks Were Excited For at Black Hat 2017

Black Hat presentations represent some of the highest quality research in the security community; here's the ones we’re most excited…

learn more
social botnet
BLOG

Inside the Massive SIREN Social Network Spam Botnet

ZeroFOX Threat Research has been investigating a large-scale, spam pornography botnet on Twitter dubbed SIREN. Read More

learn more
military scams
BLOG

Military Scams on Instagram: Why Cybercriminals Target the Armed Forces

Military scams run wild on Instagram. But what makes the military high-value target? ZeroFOX Research uses machine learning to explain.…

learn more
zerofox platform login Login
zerofox for everyone login Login