Cybercriminals constantly seek to exploit stolen data for nefarious purposes. Understanding how they benefit from this data is essential for recognizing the risks and reinforcing security measures. According to the Identity Theft Resource Center’s (ITRC) 2023 Data Breach Report, the past year brought about a somber realization that cybercriminals have …
Why is Phishing Resistance Training So Essential?
Phishing is the gateway to many damaging cyber threats like business email compromise (BEC), ransomware and account takeover (ATO). Unfortunately, employees are inundated by phishing messages every day. They’re getting harder for users to spot thanks to technologies like generative artificial intelligence (AI). These are just a few of the …
Spam vs. Phishing: Know the Difference to Avoid a Cyberattack
How do spam and phishing relate to one another in today’s ever-evolving threat landscape? Although both terms are often used interchangeably, they represent distinct yet interconnected cyberthreats. Spam and phishing emails are sometimes difficult to tell apart due to their similarities. Here’s a clear picture of the similarities they share: …
23 And You – The 23andMe Hack
A credential stuffing attack brought the popular genetic research company 23andMe to a crisis point last week, and its attacker is now offering to sell the names, locations, and ethnicities of millions of users. Credential stuffing is what happens when subscribers repeat the same username-password combinations on multiple websites, and …
Security-Savvy Employees Are Critical For Cyber Resilience
In chess, two rows of pieces are placed on either side of the board. These rows consist of eight pawns as the first line of defense against the enemy. The rest of the pieces behind them can move about effectively, depending on how you direct your pawns. But what if …
Spear Phishing is a Gateway to Disaster But Awareness Reduces Risk
A flood of phishing has been swamping businesses, with a record 1 million phishing attacks logged by the Anti-Phishing Working Group in Q1 2022. That wave of phishing attacks isn’t all just cybercriminals casting wide nets to catch as many victims as they can. While most cyberattacks are opportunistic, some …
New Wave of Supply Chain Cyber Attacks Expected
Throughout April, Shanghai and other major cities in China have been on lockdown due to recent COVID-19 outbreaks. Along with the ongoing war in Ukraine, these lockdowns have drastically impacted supply chains for industries around the world. We expect to see another wave of supply chain-related phishing and social engineering …
New Wave of Cyber Attacks Likely
According to the U.S. government, Russia is poised to unleash a massive wave of malware in retaliation for sanctions imposed after an invasion of Ukraine. The Cybersecurity & Infrastructure Security Agency warns that, unlike targeted cyber operations, malware attacks spread ubiquitously. That means a small business is far more likely …
10 Facts About the Benefits of Security Awareness Training
Are you looking for an affordable, effective way to protect your company from cyberattacks and prevent a data breach? In today’s volatile cyberattack landscape, every business in every industry is at risk of a cyberattack. That means that every business needs to make sure that it’s taking a strong defensive …
Ho-Ho-Hoax!
The Top Five Holiday Cyber Scams The holiday season is when retailers make most of their money. Cybercriminals, too. We’re making a list (and checking it twice) of the most widely used holiday cyber scams. Have a look: Bogus e-cards. Hallmark recently got out of the electronic greeting card business, …
- Page 1 of 2
- 1
- 2