What You Need to Know About DMARCIn many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... BLOG What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate... The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
What You Need to Know About DMARCIn many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
BLOG What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence... Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten... 10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate... The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which... Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program... What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...
What is Deepfake Phishing and How to Detect It? August 18, 2020 What are deepfakes? Deepfake is quite a recent phenomenon. The term is used to describe the result of artificial intelligence...
Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Advanced Persistent Threat (APT) Lazarus’ Latest Campaigns July 20, 2020 What is the first thing that comes to your mind when asked what techniques does North Korea use to threaten...
10 ways to detect phishing emails June 29, 2020 Phishing email is a type of online scam when a cyber criminal sends an email that appears from a legitimate...
The Increasing Shortage of Cybersecurity Professionals June 4, 2020 In fact, the shortage of qualified cybersecurity employees is the biggest cyber risk. A report released by Cybersecurity Ventures in...
Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
Mobile Devices Security May 22, 2020 With the existing threats to computers, mobile devices are more prone to cyber threats due to the latest technology which...
Sodinokibi Ransomware May 20, 2020 What is Sodinokibi? Sodinokibi Ransomware is also known as REvil or Sodin, discovered by S!Ri. It is a ransomware-type program...
What is Cybersecurity and Cybersecurity 101 May 19, 2020 What is Cybersecurity? Cybersecurity refers to the body of technologies, processes and practices designed to protect and defend computers, networks,...