How to Identify Phishing Emails: Follow Your InstinctsWe all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... BLOG The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... A Rust-based Buer Malware Variant Has Been Spotted in the Wild May 17, 2021 This month has begun with shocking news since cybersecurity researchers have revealed a new malspam campaign. It discovered that the... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
How to Identify Phishing Emails: Follow Your InstinctsWe all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
BLOG The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To... How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape... Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected... A Rust-based Buer Malware Variant Has Been Spotted in the Wild May 17, 2021 This month has begun with shocking news since cybersecurity researchers have revealed a new malspam campaign. It discovered that the... Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Careless Employees: Sharing & Reusing Corporate Secrets September 2, 2021 A corporate secret is “any secret practices and processes that give a company a competitive advantage over its competitors.” To...
How to Strengthen Your Security by Adopting a More Proactive Posture July 29, 2021 Most organizations today invest heavily in reactive measures in an effort to shore up their security against a growing landscape...
Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
How to Implement CIS Controls to Connect With Confidence May 19, 2021 Short for Center for Internet Security, the CIS is an independent non-profit organization dedicated to creating confidence in the connected...
A Rust-based Buer Malware Variant Has Been Spotted in the Wild May 17, 2021 This month has begun with shocking news since cybersecurity researchers have revealed a new malspam campaign. It discovered that the...
Drovorub: The Latest Russian Cyber Weapon September 9, 2020 The NSA and the FBI released a joint statement about a previously undisclosed malware used by the Russian military intelligence unit –...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Cyber Security Lessons Learned From The Pandemic August 11, 2020 Even as world starts to open up, many companies are choosing to keep employees home. However, the sudden change in...
Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...