www.micrsoftupdate.com
Open in
urlscan Pro
54.153.140.188
Public Scan
URL:
https://www.micrsoftupdate.com/
Submission: On April 29 via api from US — Scanned from AU
Submission: On April 29 via api from US — Scanned from AU
Form analysis
0 forms found in the DOMText Content
THIS WAS A PHISHING SIMULATION ORCHESTRATED BY THE OBJECTIVE IT AND SECURITY TEAMS. CONSIDER YOURSELF PHISHED! YOUR DETAILS HAVE BEEN RECORDED, SO WE MAY FOLLOW-UP WITH SOME ADDITIONAL TRAINING. UNFORTUNATELY, PHISHING ATTACKS ARE NOW AN EVERY DAY OCCURRENCE, AND INADVERTENTLY CLICKING ON AN INSECURE LINK OR OPENING AN UNKNOWN ATTACHMENT CAN HAVE SERIOUS CONSEQUENCES. Actions you can take to detect phishing emails in the future include: Here are some typical features of phishing emails, and some things to look out for, which will help you detect them in the future: 1. Any email purporting to be from an Objective address that includes the banner "This email originated from outside of Objective". 2. Look for poor spelling and grammar within the text of the email. This includes any clickable urls. 3. Hover over the url to validate any links within the email. Ensure it is a reputable domain with the correct spelling 4. A sense of urgency to respond, action, open, reply, etc. Particularly from an unknown sender. Objective Security Teams Phishing Course is always available here on the Objective Learning Hub. Whether you’re using corporate or personal email, a company/vendor will only ever send a request to reset credentials in response to the user themselves requesting the reset via that provider’s website. They may send an unsolicited report that you need to modify your credentials due to a specific circumstance, but they will advise taking that action via their website. Hence, never click directly on a URL requesting to reset your credentials, unless you triggered that email from that system yourself. EXTERNAL PARTIES READING THIS PAGE Please note that this domain was registered by and belongs to Objective Corporation solely for the purpose of Objective employees and contractors with phishing simulations and associated training. Contact details are available via the Corporate website.