What's new
UPS Takes Action Against SMS Phishing Attack
In an alarming wake-up call for the modern age, the recent data breach at United Parcel Service Canada Ltd....Read More
How has Microsoft Impersonation Become a Major Concern for CISOs?
Cyberattacks are becoming increasingly sophisticated and email impersonation is one of the most common forms of phishing attack. Cybercriminals...Read More
APT41 (HOODOO): A Hacker Group Exploiting Google’s Red Teaming Tool
In today’s digital age, the world is constantly under threat from hackers, one such group has earned its place...Read More
ChatGPT: Hackers New Toy to Develop Attack Vectors
With the advent of ChatGPT, employees are using it for all their content requirements in different business operations such...Read More
What is Spear Phishing Attack and How Can It be Prevented?
The introduction of the internet has been immensely beneficial for businesses and individuals alike. We are all engaged through...Read More
Defending Against Social Engineering in the Middle East
Social engineering attacks are a type of cyber attack that relies on human interaction to trick individuals into divulging...Read More
What is Pretexting in Cybersecurity? Techniques, Risks and Prevention
Pretexting is a cybercrime tactic where attackers will create a believable story or backstory that’ll trick someone into providing...Read More
Spear Phishing vs Phishing: Understanding the Key Differences
Along with the evolution of technology, a rapid and dramatic shift has been experienced in the occurrence of cyber...Read More
Vendor Email Compromise (VEC) Attacks: An Emerging Danger
To understand the concept of VEC attacks (Vendor Email Compromise), it is important to first understand Business Email Compromise...Read More
Identifying Types and Techniques of Phishing Attacks
Many businesses around the world lose millions of dollars due to phishing attacks. The primary reasons behind the success...Read More