News

Phishing Attackers keep Hijacking Prestigious University Email Accounts To sneak Past Corporate Security The cybercriminal interest in hijacking university email domains is one of cybersecurity’s worst kept secrets and yet it’s become a problem that only seems to generate more bad news.
Read More
INKY Technology Appoints Leigh Reichel as Chief Financial Officer COLLEGE PARK, Md., Oct. 2, 2020 /PRNewsCentre/ — INKY Technology Corporation, a pioneer in next-gen email phishing protection, today announced that Leigh Reichel, a seasoned industry leader with more than 30 years of financial management and executive leadership, has been appointed Chief Financial Officer (CFO).
Read More
Report: Phishing Campaign Uses Hidden Text to Bypass Email Security Source: www.healthitsecurity.com A new phishing campaign has been spotted in the wild using hidden text, or what’s known as zero font, to bypass email security controls and deliver malicious emails to the user, according to a recent report from Inky Technology.
Read More
Credential harvesting — How Zoom opened the phishing floodgates Video conferencing tech has been a lifeline for businesses, helping them sustain operations and communications amid the surreal events of 2020. But this sudden reliance was a vulnerability that some were ready to exploit.
Read More
Attackers Use Unicode & HTML to Bypass Email Security Tools Cybercriminals have been spotted using HTML/CSS and Unicode tricks to bypass tools meant to block malicious emails, marking a new twist in phishing techniques, security researchers report.
Read More
There But Not There: Phishing Emails Using Invisible Text We’re used to hackers slipping malicious links and attachments into phishing emails. That doesn’t mean there aren’t the occasional slip-ups that result in malware infections, but for the most part, cyber-savvy users recognize the tricks used to fool them.
Read More
Fake Zoom meeting invitation harvests Microsoft credentials Initially targeting Zoom users; the phishing scam aims for Outlook and Office365 credentials. As the digital world deals with the added responsibility of hosting more and more meetings online, popular video conferencing apps like Zoom and Microsoft Teams have increasingly come under fire from cybercriminals.
Read More
Anti-phishing startup INKY raises $20M to ramp up enterprise adoption Anti-phishing startup Inky has raised $20 million in its Series B round of funding, led by Insight Partners .
Read More
INKY Announces $20 Million Series B Raise Led by Insight Partners College Park, MD – June 4, 2020 – INKY Technology Corporation, a pioneer in next-gen email phishing protection, announced today the company’s $20 million Series B round of funding, led by global venture capital and private equity firm Insight Partners, to accelerate enterprise adoption, global expansion and its innovation roadmap. Insight has previously invested in cybersecurity companies Darktrace, SentinelOne, Armis, and Tenable. The addition of the Series B funding brings the total investment in the company to $31.6 million.
Read More
Majority of COVID phishing attacks coming from US IP addresses An anti-phishing firm discovered that most of the malicious coronavirus emails were coming from the United States. COVID-19 phishing emails have been bombarding inboxes since the virus began to spread in December and January. Cybercriminals have tried to push all kinds of scams to the masses using coronavirus-related topics, headers and organizations to get people to open malicious emails, files, or links. Complaints about phishing attacks have tripled since the concerns about COVID-19 became widespread, according to the FBI's Internet Crime Complaint Center. Cybersecurity company INKY pored through the months of coronavirus-themed phishing emails and compiled a report on where most of them were coming from, finding that the majority of IP addresses found in email headers originated from the United States. Dave Baggett, CEO of INKY, acknowledged that these IP addresses might be easily spoofed by more skilled attackers but explained that there were a number of reasons most attackers would be in the US. "The majority of our users are American. Phishers prefer to target victims within their own geography because it's easier to research and impersonate since it's the same culture and language," he said in an email interview, adding that non-American attackers may also want to spoof a US origin to evade geographical filters.
Read More