Cybersecurity Bi-weekly Roundup: Week of 24th July 2021

A bi-weekly roundup of the latest cybersecurity news and research. Halfway down the week and we’ve got you covered till the weekend on the what’s and nots in the world of cybersecurity. Without any further ado, let’s talk about the most talked about topic of the town – OLYMPICS. As much as we all love […]

Domain Spoofing : Mitigation

There was a time, when mail spoofing was an art, was a thing to impress people, was a way to phish attack someone.With increasing intelligence in spam filters – it became harder, you need good IP reputation to deliver mail to box.But now it has become almost impossible to spoof address like [email protected] . Why […]

What is Phishing ?

Definition The term phishing is a general term for the creation and use by criminals of e-mails and websites – designed to look like they come from well-known, legitimate and trusted businesses, financial institutions and government agencies – in an attempt to gather personal, financial and sensitive information. Why ? These criminals deceive Internet users into disclosing their bank […]

The Phishing surge amidst Covid 19

Did you mask your network as well during COVID-19? COVID-19 continues to significantly embolden cybercriminals’ phishing and fraud efforts, and there is a long way to stop it. Almost nine out of 10 believed they might have security gaps as the result of the rapid move to remote working. During the pandemic the cyber-attacks soar […]

Tips to Be Safe From Phishing Attacks

As you know, phishing is a technique that involves tricking the user to steal confidential information, password ,etc, into thinking you are a confidential site. So far the hackers have used emails to launch this type of attack, but with the widespread use of social media networks and smartphones with internet access, the types of attacking are multiplying. These emails include a link that takes the […]

Spear Phishing Used for Cyber Attacks against Top Institutions

To users, spear phishing emails may seem like innocent requests for information or other forms of benign contact, potentially appearing to even come from a person or company a user is friendly or familiar with. But for attackers, spear phishing emails are most often the best way to get the keys to the kingdom. Most […]

Spear Phishing , what can be Done?

Perhaps you saw an article from Forbes on the increasing prevalence of spear phishing attacks that we included. The article, entitled “Spear Phishing 101 – Who Is Sending You Those Scam Emails And Why?” examines the social engineering aspect of these attacks and how they have morphed from more obviously fake emails to sophisticated attacks that exactly […]

Difference between Phishing and Spoofing

What is Phishing? phishing is a form of criminal activity using social engineering techniques, characterized by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an email or an instant message. The term phishing arises […]

Spear Phishing used for Carbanak campaigns

The Carbanak group is infamous for infiltrating various financial institutions, and stealing millions of dollars by learning and abusing the internals of victim payment processing networks, ATM networks and transaction systems. Recently, researchers detected Carbanak campaigns attempting to: Target high level executives in financial companies or in financial/decision-making roles in the Middle East, U.S. and […]

Phishing Takedown Services : What are they and how they work?

A dive into the historical backdrop of Phishing. Phishing is simply digital scams happening traditionally in banks only but now they happen every day and everywhere around us, what makes phishing even more dangerous is that hackers can use the information garnered from phishing to pivot into other systems of your organization. Phishing looks extremely […]

Scroll to top