CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ✉ Email Security Apr 24, 2026

Attackers Favor Widely Trusted Platforms While Adapting to Detection Methods, VIPRE's Q1 2026 Email Threat Trends Report Reveals - Yahoo Finance

Yahoo Finance Archived Apr 24, 2026 ✓ Full text saved

Attackers Favor Widely Trusted Platforms While Adapting to Detection Methods, VIPRE's Q1 2026 Email Threat Trends Report Reveals Yahoo Finance

Full text archived locally
✦ AI Summary · Claude Sonnet


    This is a paid press release. Contact the press release distributor directly with any inquiries. Attackers Favor Widely Trusted Platforms While Adapting to Detection Methods, VIPRE's Q1 2026 Email Threat Trends Report Reveals PR Newswire Thu, April 23, 2026 at 4:00 AM EDT 6 min read Commercial spam, link-based malspam, and use of QR code-embedded PDFs are on the rise LONDON, April 23, 2026 /PRNewswire/ -- VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, releases its Q1 2026 Email Threat Trends Report, which finds that cybercriminals are stealing trust by exploiting legitimate sites, systems, and ecosystems to bypass defenses more easily and maximize attack success. Processing 1.8 billion emails in the first quarter of this year, this report highlights the struggles organizations face, signaling areas where they must strengthen email defenses in the coming months. Commercial spam takes up the lion's share  Commercial spam forms the majority of spam at 46%, delivered via compromised accounts (33%) and free email services (32%). This illustrates trusted platforms and free services as criminals' favored attack vectors. Commercial spam wears down users with email fatigue, increasing their chances of being phished, while the technique itself assists cybercrime through misleading subject lines, aggressive language, and act-fast promotions. Nearly two-thirds of spam came from US-based infrastructure, followed by Ireland and the UK. The US was also the top target of commercial spam at 60%, followed by the UK at 12% and Canada at 6%. Attackers exploit trusted platforms to deliver link-based phishing at scale Cybercriminals are increasingly relying on familiar, reputable platforms to carry out their attacks. Phishing made up 25.87% of all spam, with malicious links remaining the weapon of choice. During the first quarter of 2026, embedded links appeared in 50.59% of phishing emails, while 26.69% included attachments, 19.17% used callback schemes, and 3.55% relied on QR code-based phishing. Microsoft continues to be the top brand targeted for spoofing, and ".com" domains remain the primary infrastructure for sending these attacks. Furthermore, attackers favor "open redirects" that begin with the legitimate domain and then end with a parameter routing to a malicious site. Abused URLs accounted for over 89% of phishing URLs. Cybercriminals adapt to detection methods The manner in which attackers construct and deploy phishing URLs in Q1 shows they are adapting to detection methods. Newly Registered Domains (NRDs) are on the decline. As scanners become more effective at identifying newly created domains, cybercriminals are adapting by relying more on familiar, reputable domains to avoid detection. This shift reinforces their tendency to use proven strategies and exploit established, trustworthy web addresses. Story Continues View Comments Terms and Privacy Policy Privacy Dashboard
    💬 Team Notes
    Article Info
    Source
    Yahoo Finance
    Category
    ✉ Email Security
    Published
    Apr 24, 2026
    Archived
    Apr 24, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗