What is a social engineering attack?
In computing, social engineering is a broad term that covers an extensive array of insidious activities conducted via human interactions. The tactic, which is employed by cybercriminals, involves […]
In computing, social engineering is a broad term that covers an extensive array of insidious activities conducted via human interactions. The tactic, which is employed by cybercriminals, involves […]
An approach used for filtering out malicious or fake IP addresses, IP blacklisting has been designed to stop insidious threat actors from gaining access to […]
Read More… from Four enterprise challenges of using IP blacklists
A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to effectively impersonate a firm’s CEO or managers. After penetrating email filters and reaching their recipient, the hacker will […]
Spear phishing attacks are targeted assaults aimed at specific individuals and enterprises to trick them into downloading malware or exposing sensitive information. Ramping up traditional phishing techniques to the next level, these attacks are particularly pointed and far harder to […]
Read More… from Safeguarding your enterprise from spear phishing
The SolarWinds supply chain attack was officially identified on December 13, but its impact was revealed earlier on December 8, when cybersecurity company FireEye announced it had been […]
Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested in patching the deficiency, such as its vendor. Until this undiscovered vulnerability has been effectively mitigated, cybercriminals can potentially exploit this […]
Along with exorbitant bitcoin payments, ransomware operators have been stealing headlines this year, attacking companies that are desperate to safeguard confidential data from exposure. Deploying malicious software via phishing emails and social engineering […]
Companies that keep or use personal data are required by regulations to provide adequate security for this information to protect the individuals it belongs to. When private data is leaked, it can also have significant consequences for the companies charged with its safety. If a firm failed to […]
International electronics manufacturing giant Foxconn is facing a multimillion-dollar ransom demand after its facility based in Chihuahua, Mexico was […]
From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate, online threats targeting individuals create serious risks for […]
Read More… from Eight cybersecurity insights to keep you safe
A new form of malware has been identified hidden inside sharing icons for social media, capable of stealing shoppers’ […]
Fraudulent emails are electronic messages that are designed to fool victims for personal and criminal gain, or to inflict harm on an organisation or individual using a fraudulent act. Phishing emails are an example of such criminal […]