www.micrsoftupdate.com Open in urlscan Pro
54.252.163.162  Public Scan

URL: https://www.micrsoftupdate.com/
Submission: On May 03 via api from US — Scanned from AU

Form analysis 0 forms found in the DOM

Text Content

THIS WAS A PHISHING SIMULATION ORCHESTRATED BY THE OBJECTIVE IT AND SECURITY
TEAMS. CONSIDER YOURSELF PHISHED! YOUR DETAILS HAVE BEEN RECORDED, SO WE MAY
FOLLOW-UP WITH SOME ADDITIONAL TRAINING.


UNFORTUNATELY, PHISHING ATTACKS ARE NOW AN EVERY DAY OCCURRENCE, AND
INADVERTENTLY CLICKING ON AN INSECURE LINK OR OPENING AN UNKNOWN ATTACHMENT CAN
HAVE SERIOUS CONSEQUENCES.


Actions you can take to detect phishing emails in the future include:
Here are some typical features of phishing emails, and some things to look out
for, which will help you detect them in the future:
 1. Any email purporting to be from an Objective address that includes the
    banner "This email originated from outside of Objective".
 2. Look for poor spelling and grammar within the text of the email. This
    includes any clickable urls.
 3. Hover over the url to validate any links within the email. Ensure it is a
    reputable domain with the correct spelling
 4. A sense of urgency to respond, action, open, reply, etc. Particularly from
    an unknown sender.

Objective Security Teams Phishing Course is always available here on the
Objective Learning Hub.

Whether you’re using corporate or personal email, a company/vendor will only
ever send a request to reset credentials in response to the user themselves
requesting the reset via that provider’s website. They may send an unsolicited
report that you need to modify your credentials due to a specific circumstance,
but they will advise taking that action via their website. Hence, never click
directly on a URL requesting to reset your credentials, unless you triggered
that email from that system yourself.




EXTERNAL PARTIES READING THIS PAGE

Please note that this domain was registered by and belongs to Objective
Corporation solely for the purpose of Objective employees and contractors with
phishing simulations and associated training. Contact details are available via
the Corporate website.