What's new
How Attackers Breach Organizations via Mobile Phones
If you think that there is no way cyber criminals can hack your organization through mobile phones, think again. Whether your company...Read More
Top 5 Cybersecurity Breaches Due to Human Error
Despite the rapid rise in cyber security growth rate over the last few years, organizations worldwide are still haunted by the...Read More
Read a Brief Guide on Vishing Attack
What is Vishing Attack? “Hello, I am calling from your bank. I would like to confirm a few details...Read More
SMS Phishing Scam: OCBC Bank’s Customers lost $8.5 Million
On 30th December 2021, Singapore police made an announcement that a widespread phishing scam occurred through SMS. These messages were impersonated on...Read More
A Brief Introduction to Email Spoofing
Just like traditional criminals use forgery as a gateway to numerous complicated crimes, email spoofing follows the same concept...Read More
Scareware Attack via Web App Exploitation
Anxiety, stress, fear, shock, etc., are the terms that have always been used in medical science to emphasize psychological...Read More
Beware of Quid Pro Quo Cyber Threats
A Quid Pro Quo attack is a type of social engineering attack like phishing, baiting, tailgating, or piggybacking. It...Read More
The What, Why & How of Baiting Attacks
Social engineering, which refers to the careful manipulation of human behavior, has become the basis for the majority of...Read More
Perfect Phishing Attack: A Penetration Tester’s Perspective
Even if your company uses top-notch security solutions to keep malicious actors at bay, these efforts are half-baked as...Read More
Pegasus Project Reveals Massive Data Leak
The Pegasus project reveals human rights activists, journalists, ministers, and lawyers around the globe have been targeted by cyber-surveillance...Read More