Share this content in seconds -- simply copy and paste the following text into an email and send it to your end users.
Attack Spotlight: Phishing Campaign Delivers Dangerous Trojan
Be on the lookout for a current cyberattack that tries to trick you into clicking a link or opening a malicious attachment, often by impersonating an email from a reputable organization. The link or attachment installs a trojan, a malicious program that can steal your login credentials, steal your emails, and install other malicious programs on your machine.
The link below takes you to a brief (two-minute) module that helps you identify the attack and explains what to do if you see it.
(Note: This link will take you to the website of Wombat Security, a division of Proofpoint.)
You can also read the attached PDF for more information.
More Attack Spotlight Content
Attack Spotlight provides infosec professionals with free, actionable content designed to arm end users against the most relevant real-world phishing attacks and lures being seen in the wild.