The Multiplying Effect of Vendor Email Compromise

The Multiplying Effect of Vendor Email Compromise

By now, most people know about the potential threat from business email compromise or BEC. With BEC, someone in a company gets their email taken over by a hacker and the hacker uses the trust implied in that email to exploit others in the company. “Formerly dubbed as Man-in-the-Email scams, BEC attackers rely heavily on

View Full Post
Cybersecurity Updates For The Week 45

Cybersecurity Updates For The Week 45

Recent years have witnessed a significant upsurge in the rate of cybercrimes. Not only has the frequency of attacks increased, but even the methods used for launching cyberattacks have also been evolving to include the most sophisticated and unique forms of phishing that phishing prevention almost becomes an unattainable goal for many. However, the least

View Full Post
Phishers Sure are Cold-hearted

Phishers Sure are Cold-hearted

When you tell me that phishers go after large enterprises, I get it. There’s a lot of valuable data there. When you tell that they go after banks, cause that’s where the money is, I understand. But, when you tell me they’re going after relief agencies, I call them cold-hearted. That’s the news making headlines

View Full Post
Cybersecurity Updates For The Week 44

Cybersecurity Updates For The Week 44

The rate at which cybercrimes are propagating is beyond the imagination of an ordinary mind. All we can say is that the ill-motivated have begun to outnumber and outsmart the good actors in the cyberworld. This becomes evident in the endless stream of failed phishing prevention measures that lead to major cybercrimes such as identity

View Full Post
User Accounts On Netflix Hacked By The Thousands

User Accounts On Netflix Hacked By The Thousands

Netflix, the popular online entertainment and video streaming site, has millions of subscribers and hence is a tempting target for the cybercriminals that look to hack into email accounts to gain illegitimate access to services. When they target many, even a small percentage of success could mean something significant. 

Cybersecurity Updates For The Week 43

Cybersecurity Updates For The Week 43

Cybersecurity is a growing concern across the globe. But as more and more people are gaining awareness about the importance of anti-phishing solutions, there are all the more instances of cybercrimes recorded. There is little doubt that the increase in the adoption of cybersecurity measures is followed by a parallel and perhaps more significant increase

View Full Post
Time for Your Yearly Performance Appraisal? Maybe not!

Time for Your Yearly Performance Appraisal? Maybe not!

If you work at an organization, there’s a pretty good chance you’re in for a yearly performance appraisal. And if you are, it’s likely that someone from human resources will send you an email around that time reminding you of that. But beware, that email may not be what you think it is. There’s a

View Full Post
Cybersecurity Updates For The Week 42

Cybersecurity Updates For The Week 42

Today’s cyberspace includes computer resources, IT networks, and all the fixed and mobile devices which connect to the internet. Because of the borderless nature of the global internet, protection of critical infrastructure operations is emerging as a significant challenge. Hackers always look to exploit the vulnerability of an unsuspecting internet user. Hence, cybersecurity experts strive

View Full Post
Hackers Show Once Again They Care About More Than Just Money

Hackers Show Once Again They Care About More Than Just Money

When you think of phishing, you probably think of ransomware (which you should). And when you think of ransomware, you probably think about money (which you should). The money the hackers are trying to get as a ransom. There’s no doubt that most phishing attacks, either directly or indirectly, are about money. But not all.

View Full Post
Why the New Instagram Anti-Phishing Tool Won’t Work

Why the New Instagram Anti-Phishing Tool Won’t Work

As previously discussed on this blog, Instagram is now more popular than Facebook when it comes to phishing attacks. As the article detailed, Instagram is popular as a target for phishing attacks because Instagram phishing attacks can so easily go viral, given that every victim can quickly lead to hundreds of more emails to trusted

View Full Post
Cybersecurity Updates For The Week 41

Cybersecurity Updates For The Week 41

Cybersecurity is a dynamic arena with some event or the other never ceasing to take place. While cybersecurity measures reach unmatched levels of sophistication and ultra protection, cyber attacks make an equal stride. Thus the stifle between the good and the bad actors of the cyber world is never-ending. However, anyone interested in these affairs

View Full Post
You’ll Never Guess Who’s Behind the Latest Phishing Attacks

You’ll Never Guess Who’s Behind the Latest Phishing Attacks

Would you believe North Korea, Nigeria and Egypt? You might think that phishing emails from these “third world” countries would be unsophisticated and easy to detect. You’d be wrong. First North Korea. According to the Digital Journal, “Several U.S. businesses have been targeted by a campaign seemingly to originate from North Korea and using the

View Full Post
Cybersecurity Updates For The Week 40

Cybersecurity Updates For The Week 40

Cybersecurity is the biggest challenge that confronts all netizens today. No matter how strong and secured a network chain is attackers manage to exploit the loopholes, using it to their benefit and misguiding the users to extract personal details. Individuals and organizations deploy anti-phishing measures, but bad actors always look forward to outsmarting them. Here

View Full Post
Hackers Find One More Way to Use Google to Scam You

Hackers Find One More Way to Use Google to Scam You

At this point, mentioning a new Google attack vector is almost not news anymore, given how many times the company’s services have been exploited. It’s to be expected though. Google makes most of its service available free of charge, which means not only do you have free access to it, so do hackers. And given

View Full Post
Microsoft and Google Team up to Phish You

Microsoft and Google Team up to Phish You

When hackers go after you with phishing emails, you’ll never guess which brand they impersonate the most. Microsoft. “Given the ubiquity of Windows and Office, as well as other services including the Outlook.com webmail service and Xbox Live, Microsoft’s position at the top of the list should come as no surprise.” You’ll never guess which

View Full Post
Cybersecurity Updates For The Week 39

Cybersecurity Updates For The Week 39

The recent updates from the world of cybersecurity touch many crucial areas and offer critical insights for individuals and businesses who are keen to improve their digital security. Hence, we compiled all major cybersecurity events and other developments which will enable them to take a step forward for establishing a robust cyber-security infrastructure.

Stop! Don’t Watch That Video

Stop! Don’t Watch That Video

If one of your Facebook friends sent you an email that said “Is this you?” with a link to a video, would you click on it to see if it’s you? If so, there’s a good chance you’re going to get phished, because you just fell for the newest Facebook phishing scam. According to the

View Full Post