INKY Government IT News

Back to Top

September 01, 2020
INKY-microsite.png

Special Report: INKY Identifies Thousands of Phishing Attacks That Slip Through Legacy Solutions

INKY Technology Corporation, an email protection startup that leverages the power of unique computer vision and artificial intelligence (AI), today announced the release of the company’s 2019 Special Phishing Report, which quantifies just how many phishing emails still breach the leading email protection systems, and examines why identifying and blocking these attacks still poses such a challenge.

May 27, 2020
INKY-microsite.png

Majority of COVID phishing attacks coming from US IP addresses, report finds

COVID-19 phishing emails have been bombarding inboxes since the virus began to spread in December and January. Cybercriminals have tried to push all kinds of scams to the masses using coronavirus-related topics, headers and organizations to get people to open malicious emails, files, or links.

April 02, 2020
INKY-microsite.png

Office 365 Phishing Uses CSS Tricks to Bypass Email Gateways

A phishing campaign using Office 365 voicemail lures to trick them into visiting landing pages designed to steal their personal information or infect their computers with malware.The phishing emails delivered by the operators behind this series of attacks use the old trick of reversing some of the text elements in the source code and rendering forward within the email displayed to the target, with a twist: this time it involves using Cascading Style Sheets (CSS).

January 15, 2020
INKY-microsite.png

New Report Spotlights Changes in Phishing Techniques

As email security providers strengthen their defenses, attackers develop new ways to work around them. A new report from Inky sheds light on how these techniques are evolving to become more complex and difficult to detect by unsuspecting targets. "They're clearly testing those systems, and then they're exploring ways to get through," says Inky co-founder Dave Baggett of email security defenses. Today's adversaries are looking for ways to hide from legacy protection systems while avoiding suspicion from users, he adds.