Search Results for: social media Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,... Blog Post Should CEOs Delete Their Social Media Accounts?! January 30, 2020 Cyber-attacks have become the most feared threat for large organizations and businesses. A majority of the CEOs are worried about... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post Hackbits Episode 4: Cybersecurity and NY Department of Financial Services September 10, 2021 Hackbits host Gaspare Marturano interviews SMLR Group, Inc. CEO Alan Heyman. Mr. Heyman is a recognized expert in many phases... Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information... Blog Post NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson... Blog Post Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... Blog Post Award winning game studio hit by ransomware and threatened to get data leaked March 5, 2021 In early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got... Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these... Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find... Blog Post Fake Instagram Apps on Google Playstore April 18, 2019 Multiple fake apps were found on the Google Playstore phishing for Instagram users. These apps claim to help Instagram users... Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,...
Blog Post Should CEOs Delete Their Social Media Accounts?! January 30, 2020 Cyber-attacks have become the most feared threat for large organizations and businesses. A majority of the CEOs are worried about...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post Hackbits Episode 4: Cybersecurity and NY Department of Financial Services September 10, 2021 Hackbits host Gaspare Marturano interviews SMLR Group, Inc. CEO Alan Heyman. Mr. Heyman is a recognized expert in many phases...
Blog Post Steve Durbin, Managing Director at the ISF Interview with Ondrej Krehel About Current Cyber Threats October 1, 2020 ISF Podcast: A Digital Forensics Specialist on Data Breaches It is an unavoidable fact that businesses and organizations’ sensitive information...
Blog Post NATO Live Stream – Russia’s Strategy in Cyberspace December 14, 2020 On December 2, NATO held a live stream discussing Russia’s strategy in cyberspace. Among the invited speakers were Oscar Jonsson...
Blog Post Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack...
Blog Post Award winning game studio hit by ransomware and threatened to get data leaked March 5, 2021 In early February, CD Projekt Red, the game studio behind popular games like The Witcher series, and Cyberpunk 2077 got...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post How Fake Accounts and Sneaker-Bots Took Over the Internet September 3, 2021 If you’ve used any form of social media before, you have run into fake accounts with less-than-noble intentions. Usually, these...
Blog Post How expired web domains help criminal hackers unlock enterprise defenses January 19, 2022 Managing a company’s security can feel like trying to keep an old, leaky boat afloat. As soon as you find...
Blog Post Fake Instagram Apps on Google Playstore April 18, 2019 Multiple fake apps were found on the Google Playstore phishing for Instagram users. These apps claim to help Instagram users...
Blog Post DeathStalker: A threat group utilizing unique methods September 3, 2020 DeathStalker is a hacker group active at least since 2012, with operations around the world. Their focus is spying...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...