Proofpoint closes acquisition of Tessian. Read More ->

Request a demo
Request a demo
Request a demo
Request a demo
Request a demo

Infographic: The Most Common Malicious Attachments 2021

We’re taught that “most bad emails contain attachments” but, what attachments are most frequently leveraged in phishing attacks, and how can you identify one?

 

Download this infographic and share with employees to teach them:
  • Which file extension types are seen most (and least) often
  • Why PDFs are a favorite amongst hackers
  • How to spot a malicious attachment
  • What to do if one lands in your inbox
Infographic: The Most Common Malicious Attachments 2021
DOWNLOAD PDF →

We’re taught that “most bad emails contain attachments” but, what attachments are most frequently leveraged in phishing attacks, and how can you identify one?

 

Download this infographic and share with employees to teach them:
  • Which file extension types are seen most (and least) often
  • Why PDFs are a favorite amongst hackers
  • How to spot a malicious attachment
  • What to do if one lands in your inbox