What's new
A Brief Introduction to Email Spoofing
Just like traditional criminals use forgery as a gateway to numerous complicated crimes, email spoofing follows the same concept...Read More
Scareware Attack via Web App Exploitation
Anxiety, stress, fear, shock, etc., are the terms that have always been used in medical science to emphasize psychological...Read More
Beware of Quid Pro Quo Cyber Threats
A Quid Pro Quo attack is a type of social engineering attack like phishing, baiting, tailgating, or piggybacking. It...Read More
The What, Why & How of Baiting Attacks
Social engineering, which refers to the careful manipulation of human behavior, has become the basis for the majority of...Read More
Perfect Phishing Attack: A Penetration Tester’s Perspective
Even if your company uses top-notch security solutions to keep malicious actors at bay, these efforts are half-baked as...Read More
Pegasus Project Reveals Massive Data Leak
The Pegasus project reveals human rights activists, journalists, ministers, and lawyers around the globe have been targeted by cyber-surveillance...Read More
An Overview of Email Threats in Qatar
Identify the current email threats that are targeting organizations in Qatar! Today almost every company uses email as a...Read More
Cyber Attack Exposes Student Data in Israel
Another day, another data leak! According to a report in the Jerusalem Post, the data of around 280000 students...Read More
26 Million User Credentials Lost to Malware
A malware stole about 26 million user login credentials from almost a million websites! According to The National News,...Read More
Third-party Data Breaches: A Rising Threat
As the infamous SolarWinds Attack wreaked havoc on several organizations around the world, the importance of including supply chain...Read More