How to Identify a Business Email Compromise Attack
Business email compromise attacks have skyrocketed over the last few years. Hackers use this strategy to target corporate or publicly available email accounts of executives…
US Postal Service exposed the details of 60 million people
A few weeks ago the United States Postal Service (USPS) patched up a vulnerability that has been revealing the details of sixty million people.
Cyber-criminals invent a new “no talk” scam to trick you
Traditional phone scams involve someone trying to talk you into handing over passwords – but that’s just changed
How to detect a critical security incident?
There are several ways to detect the whether the company is facing critical security incidents. With these measures their relevance can be evaluated.
Errors to avoid when downloading apps
Most smartphone apps are perfectly safe – but some are bad. These tips will help keep you safe.
Hackers attack a company serving an area affected by hurricanes
Why would hackers attack a water utility company serving an area affected by the hurricanes?
What is Threat Hunting and why is it necessary?
Companies are increasingly aware of the importance of creating detection and hunting capacities that help to keep their business’s future from being put at risk.…