Government ID Database Hack for the Entire Population of ArgentinaAllegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to... BLOG How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Government ID Database Hack for the Entire Population of ArgentinaAllegedly, cybercriminals managed to hack the government ID database of the entire population of Argentina in September 2021. According to...
BLOG How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective.... Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected... Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT... How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive... How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to... Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis... Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to... What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
The Dangers of BulletProofLink as a Large-Scale Phishing-As-A-Service Scheme October 27, 2021 Phishing is among the most frequent malicious activities deployed by cybercriminals and it is also one of the most effective....
Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...
Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive...
What Is Open-Source Intelligence and Why Is It Important? January 18, 2021 The initial stage of a penetration test requires the testers to gather information about the target organization and its IT...
How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
E-Land Retail Ransomware Attack December 30, 2020 E-Land Retail, a subsidiary of the E-Land Group conglomerate announced on 23 November of 2020 that it suffered a massive...
How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Phishing Awareness Training Effective Only for a Few Months October 12, 2020 In the majority of cyber breaches, phishing attacks are the root cause. Phishing awareness training sensitizes a company’s employees to...
Ransomware Guide by US CISA and MS-ISAC October 5, 2020 On September 30, 2020, The US Cybersecurity & Infrastructure Security Agency (US CISA) and the Multi-State Information Sharing & Analysis...
Roger Ransomware October 1, 2020 Roger ransomware belongs to the CrySIS/Dharma family. It got its name out of the .ROGER extension it usually adds to...
What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...