<p>A workday for many employees involves sorting through a seemingly endless flow of emails and meeting invitations. Some are important. Some are not. Some are downright dangerous.</p>
<p>As this week’s featured news shows, bad actors won’t let up on inserting phishing attempts or prompt injections into those routine messages and invitations. An occasional visit to an email account’s spam folder is a good reminder that cyberdefense tools filter out many malicious messages — but not all of them. The last line of defense is often the judgment of the recipient.</p>
<p>Knowing how to spot phishing attempts is the foundation of most cybersecurity awareness training programs. It’s also what organizations use to <a href=”https://www.techtarget.com/searchsecurity/tip/5-tips-for-building-a-cybersecurity-culture-at-your-company”>build a strong cybersecurity culture</a>.</p>
<p>While there’s debate about the <a target=”_blank” href=”https://www.cybersecuritydive.com/news/cybersecurity-awareness-training-research-flaws/803201/” rel=”noopener”>effectiveness of awareness training</a>, it’s impossible to overstate the importance of an individual employee’s vigilance. That in-the-moment decision to click or not matters. According to the “Microsoft Digital Defense Report 2025,” 28% of breaches can be traced back to phishing and social engineering campaigns.</p>
<p>Email trickery remains an inviting entry point for attackers, even though the threat is well-understood and organizations <a href=”https://www.techtarget.com/searchsecurity/tip/2019s-top-email-security-best-practices-for-employees”>strive to guard against it</a>. And the threat is only growing stronger. Experts warn that <a href=”https://www.techtarget.com/searchsecurity/tip/Prepare-for-deepfake-phishing-attacks-in-the-enterprise”>deepfake phishing tactics</a> and other sophisticated techniques are exacerbating the problem.</p>
<p>This week’s featured headlines provide fresh evidence that every inbox should be considered an attack vector.</p>
<section class=”section main-article-chapter” data-menu-title=”Filters don’t catch legit-looking relay spam emails”>
<h2 class=”section-title”><i class=”icon” data-icon=”1″></i>Filters don’t catch legit-looking relay spam emails</h2>
<p>Users have reported a surge in spam emails originating from Zendesk domain
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: