Search Results for: spear phishing Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more... Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It... Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was... Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in... Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?... Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think... Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... Blog Post Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive... Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that... Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out... Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning... Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Blog Post Commonly Used Phishing and Spear Phishing Tactics July 8, 2021 Techniques for seizing personal information on users are plenty. To further complicate digital security, strategies employed by cybercriminals are more...
Blog Post Lazarus Hacking Group Set IT Supply Chain Attacks in Motion November 25, 2021 North Korean-backed Lazarus hacking group that inclines to infiltrate the military has now shifted its focus on new targets. It...
Blog Post Cyberattacks Targeted US Water and Wastewater Facilities November 3, 2021 On October 14, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) has released a joint cybersecurity advisory. Its substance was...
Blog Post Phish Scale – A New Paradigm for Phishing Email Awareness November 19, 2020 Phishing is still an extremely common attack vector directed at individuals and organizations alike. Employees can be targeted specifically in...
Blog Post Recent Phishing Tactics Making People Falling Prey to Them December 31, 2020 It might come out as a surprise to you that the attack vector has been on the contraction for the...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Knowledge Center Successful (And Easy) Attack Vectors 2020 May 3, 2021 How can attackers access your MFA-protected Company mailboxes? How can they move from one machine to another in your infrastructure?...
Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
Blog Post FBI And Homeland Security Warning: The FBI And CISA Have Observed Targeting U.S. Think Tanks By APT December 7, 2020 In a joint cybersecurity advisory published on December 1, the FBI and CISA warned about APT targeting the U.S. think...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post Justice Department Brings Prolific Ransomware NetWalker to Book February 18, 2021 .Ransomware attacks seem to have become an unavoidable risk of doing business over the last few years. Cunning and proactive...
Blog Post Phishing Attacks & How Can You Avoid Them? March 28, 2020 The term “KISS”, which means “keep it simple, stupid”, first appeared in the US Army in 1960. This means that...
Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Blog Post Cybersecurity Compliance Laws in 2021 – Keeping Your Organization on the Right Side of the Law March 24, 2021 Cybersecurity and regulatory compliance are becoming increasingly entwined, especially regarding businesses for which consumer data is a key resource. Learning...
Blog Post What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...