What's new
What is a Polymorphic Attack? Detection and its Solutions
The term “polymorphic attack” first appeared in the field of cybersecurity in 1990 and describes a new type of...Read More
Email Impersonation Attack are on the Rise
Fraudsters can take advantage of human vulnerabilities through email impersonation attack. Impersonation attacks have infinite variations and each one...Read More
RAT Attack Unveiled: Deploying Two Trojans
A threat actor has been found to leverage two of the most popular remote access trojans (RAT attack), including...Read More
Zoom Phishing Attacks: A Method for Scammers
Video conferencing applications like Zoom became a popular medium for daily meetings to discuss plans of action and everyday...Read More
Reasons Behind Successful Phishing Attacks
Technology has made everyone’s life very easy. People can get anything with just a click and can also keep...Read More
A Brief Guide to Types of Social Engineering Attacks
We are all aware of various types of attackers who are professional and have the technical expertise to exploit...Read More
Top Real-life Examples of BEC Attacks
Nowadays, BEC attacks are considered the most dangerous cyber threat for organizations and the most lucrative attack vector for...Read More
Impersonation Attacks Led By Email Phishing and Spoofing
“Among all the email impersonation attacks in 2020, 50% were phishing, 36% were scamming, 12% were BEC, and 2%...Read More
Social Engineering Attacks: Techniques and Prevention
Social engineering is the art of tricking and manipulating people into gaining fraudulent access to their sensitive information. Threat...Read More
Rise in Cyber Attacks in UAE since 2020
Ever since the start of the pandemic, organizations in the UAE have been at the receiving end of many...Read More