About 3,300,000 results
Open links in new tab
  1. How to protect against phishing attacks - Microsoft Defender for ...

    Apr 24, 2024 · Phishing attacks attempt to steal sensitive information through emails, websites, text messages, or other forms of electronic communication. They try to look like official communication …

  2. Malware 101—common malware threats via email - Zoho

    Jul 25, 2025 · Discover the most common types of malware spread through email, how they work, and what steps you can take to protect your inbox from these persistent cyber threats.

  3. 11 Email Threats Every Organization Must Know

    Sep 7, 2025 · Email remains the primary entry point for cyberattacks. From nation-state actors to low-level cybercriminals, adversaries continually exploit the ubiquity and human trust inherent in email …

  4. Malicious Email Attachments - Proofpoint US

    Learn how a malicious email attachment is capable of destroying data and stealing information. Find out how to protect against malicious attachments with an email security solution.

  5. What is email security? - Cloudflare

    Attackers can deliver malware via email in several different ways. One of the most common is including an email attachment that contains malicious code.

  6. DOD Cyber Awareness Challenge 2025 Knowledge check

    How can you prevent viruses and malicious code? Scan all e-mail attachments (Correct) Ref: Cyber Awareness Challenge 2025 / Protecting Against Malicious Code Matt is a government employee who …

  7. Why Email Is Still the #1 Cyber Threat — and What You Can Do About It

    May 9, 2025 · Discover why email remains the top cyber threat and explore effective strategies to protect your organization against evolving email-based attacks. Learn more about advanced security …

  8. Malware, Phishing, and Ransomware | Cybersecurity and ... - CISA

    Jan 5, 2024 · Malware, Phishing, and Ransomware are becoming increasingly common forms of attack and can affect individuals and large organizations. Malware is any software used to gain …

  9. Overview In today's digital landscape, it is vital for your organization to protect sensitive data. Although email is a fundamental means of communication, it is susceptible to various threats. Email serves as …

  10. 7 Ways Cybercriminals Spread Malware and Infect Your Device

    Feb 1, 2024 · Learn about malware, how cybercriminals spread malware, how you can detect malware and how you can stay protected against it.