2019/20’s 10 biggest, boldest, and most brazen business email compromise scams

Understand how email scams work to know how they can be avoided

whitepaper
Proofpoint logo

Telling the difference between authentic emails and an impostor’s scam is not always easy. That’s because business email compromise (BEC) attacks prey on human nature, the innate psychological traits shared by everyone. 

This whitepaper offers a roundup of the most high-profile (and low-minded) BEC and email account compromise (EAC) attacks of the last 12 months.

Download it now to understand how email scams work and know how they can be avoided.

Recommended

Education and government most at risk from email threats
phishing

Education and government most at risk from email threats

26 Nov 2021
Attackers use CSS to fool anti-phishing systems
phishing

Attackers use CSS to fool anti-phishing systems

11 Nov 2021
Senate report slams agencies for poor cyber security
cyber security

Senate report slams agencies for poor cyber security

3 Aug 2021
Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021

Most Popular

What should you really be asking about your remote access software?
Sponsored

What should you really be asking about your remote access software?

17 Nov 2021
How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

24 Nov 2021
Nike to take customers into the metaverse with 'NIKELAND'
virtualisation

Nike to take customers into the metaverse with 'NIKELAND'

19 Nov 2021
Jack Dorsey resigns as Twitter CEO
business management

Jack Dorsey resigns as Twitter CEO

29 Nov 2021