Search Results for: emails Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the... Blog Post The FBI’s Email System Was Hacked to Send Out Fake Cybersecurity Warnings December 2, 2021 On November 13th, hackers targeted the email servers of the FBI and sent phony cybersecurity warnings to over 100.000 recipients... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates.... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a... Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow.... Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the... Blog Post 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post How to Identify Phishing Emails: Follow Your Instincts November 26, 2021 We all know that phishing emails are fake emails that we need to identify to thwart their consequences. In the...
Blog Post The FBI’s Email System Was Hacked to Send Out Fake Cybersecurity Warnings December 2, 2021 On November 13th, hackers targeted the email servers of the FBI and sent phony cybersecurity warnings to over 100.000 recipients...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post NSA Discovers New Critical Vulnerabilities In Exchange Server April 20, 2021 Admins of the Microsoft Exchange Server have been having rough weeks. Yet, matters still do not seem to be getting...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post Ransomware Attacker Offers Employees a Cut if They Install DemonWare on Their Organization’s Systems September 30, 2021 It may seem impossible to think that your employees or peers could knowingly compromise the security of your business. However,...
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post Business Email Compromise (BEC) June 19, 2020 Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
Blog Post Healthcare Ransomware and Cyberattacks July 20, 2021 Healthcare has become an increasing target of ransomware and other cyberattacks since the emergence of the COVID-19 pandemic. Indeed, a...
Blog Post The Rise of Cyberattacks Towards Cities and Towns September 24, 2021 As daily lives continue to migrate online, the dangers of hackers compromising personal information and shutting down critical services grow....
Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the...
Blog Post 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate...