Get deeper insight into attack types and classifications.
Business Email Compromise

BEC is typically a text-based attack that uses executive or vendor impersonation to trick a victim into sending money or sensitive data. They are the most financially-devastating attacks, making up 35% of all losses to cybercrime in 2021.

Credential Phishing

Credential phishing emails contain links to spoofed login pages of legitimate sites to steal usernames and passwords. They often impersonate well-known brands or internal IT systems.


An extortion attack is a form of cyber blackmail, where attackers threaten to release compromising information. It uses fear to force people into paying money for the concealment of that information.

Fake Billing Scam

Fake billing scams are attacks that are created to mimic a payment confirmation for various products or services. The emails are constructed to look like the recipient or recipient’s company has made a payment, when in fact they have not.


Malware, or malicious software, is a type of file or code that can compromise a target’s computer or network. While it can be delivered in a variety of ways, the most common delivery vector is via email.