Resources

Blog

Pig Butchering Scam – What It Is and How to Protect Yourself

Cyber threats are constantly evolving, and the most recent evolution of phishing scams is proving particularly effective. Boasting a gruesome name, pig butchering is a cyber threat that reels in victims and steals thousands, sometimes millions of dollars. Pig butchering has quickly become one of the most lucrative scams thanks to a mix of post-pandemic loneliness and inadequate technological...
Blog

Protect your loved ones from phishing, social engineering and other cyber attacks

Valentine’s Day isn’t just a day for romance. It’s a time of year when cyber criminals and scammers launch attacks such as phishing , vishing , smishing , and social engineering . Australia has begun issuing warnings to singles, informing them of the “pig butchering” or “romance baiting” scam that’s prominent on Valentine’s Day. It starts with the attacker assuming the identity of an attractive...
Blog

Using Generative AI Responsibly: Exploring 5 Common Use Cases

The rise of generative AI like ChatGPT and Midjourney has been one of this decade’s most revolutionary technological advancements. This technology has allowed businesses to scale their operations more efficiently and enabled entirely new functionalities within existing tools. While generative AI has had a largely positive impact on the world, its negative aspects cannot be ignored. From text to...
Blog

Voice Generation AI: A Major Threat to Communication Carriers' Security Systems

Voice-based cyber attacks have existed for a long time and have wreaked havoc worldwide. They are a low-effort, high-reward attack that can be scaled to extreme heights with very little effort apart from finding phone number lists to call. This is part of the reason why vishing attacks have seen a 54% increase in 2022. A potentially even more aggravating factor is the recent drastic improvements...
Blog

How Is the Digital Age Redefining Social Engineering's Playbook?

Phishing has always been a prominent attack vector, skyrocketing as traditional hacks became more complicated. Even worse, hackers have begun perfecting their tactics to make them more reliable and damaging. One of the most dangerous variants is social engineering, and with the help of AI, it's now becoming increasingly sophisticated. Let's discuss how AI is changing social engineering's playbook...
Blog

AI in Cyber Security: Pros and Cons, and What it Means for Your Business

AI has been making waves in virtually every industry, and cyber security is no exception. Several companies are adopting the technology into different business functions, such as logistics and IT. But as AI quickly leaks into the business landscape, it’s also been the subject of criticism. Recently, news reports have revealed that ¾ of global businesses are considering or have already implemented...
Blog

How Artificial Intelligence Benefits Cyber Security Awareness Training

AI is changing how people live and work. Thanks to intuitive machine learning systems, the ability to predict, personalize, and customize has reached new levels. These capabilities of prediction, personalization, and customization make AI the perfect match for cyber security awareness training . AI cyber security training lets you meet individual employee learning needs directly. Some employees...
Blog

ChatGPT and Its Recent Cyber Security Scares

Conversational AI has lately been the talk of the town for most knowledge workers worldwide. While this technology has existed for a few years, OpenAI’s ChatGPT released this year is leaps and bounds ahead of anything seen before. This trailblazing web app has been used for anything from writing wedding speeches to helping people do their jobs more efficiently. One thing is certain—a shocking...
Blog

Cyber Security Preparedness in a Hybrid World

Offices around the world have undergone a massive transformation in recent years. While a fully remote workforce remains offered by a minority of employers, the hybrid nature of workplaces is rapidly becoming the norm. A recent study by Cisco studied the cyber security challenges tied to a distributed workforce, and their cyber security readiness model created some troubling statistics. According...
Blog

Are You Being Played? AI's Role in Social Engineering and How You Can Protect Yourself

While there’s no denying that AI has its advantages, it also comes with its fair share of drawbacks. One of which is its role in making social engineering easier to pull off. Cyber criminals are beginning to utilize AI software to generate the voice of chief executive officers and fool employees into revealing sensitive information or initiating monetary transfers. An astounding 82% of cyber...
Blog

9 Examples of Social Engineering Attacks

All examples of social engineering take advantage of human nature, such as the willingness to trust others, to trick individuals into divulging sensitive information. Despite its prevalence, social engineering can be challenging to distill into a single formula. It’s one of the reasons 82% of data breaches involve the human element. Social engineering has become the backbone of many cyber threats...
Blog

What You Need to Know About the Google Drive Scam

Hackers are targeting hundreds of thousands of Google users with fake Google Drive notifications and emails to try and trick them into visiting malicious websites.
Blog

Yes, Cybercriminals Can Use ChatGPT to Their Advantage, Too

In the age of robots and artificial intelligence comes another player in the AI market: ChatGPT (Generative Pre-trained Transformer). Since its release, cyber security professionals have unlocked various opportunities with its features. Namely, it can answer prompts, write codes on demand, detect phishing emails , and crack passwords . In a nutshell, ChatGPT can be an invaluable tool for security...
Blog

13 Online Shopping Tips to Stay Safe During Black Friday and Cyber Monday

During the annual eCommerce bonanza known as Black Friday and Cyber Monday weekend, shopping websites will be swarming with people who are mostly unaware of cyber threats that can leave personal data vulnerable. In 2021, Europe, Canada, and the United States saw a 50% spike in transactions during the Black Friday and Cyber Monday window from the previous week. With the imminent spike in online...
Guide

How to Protect Your Data from Social Engineering

Download the whitepaper and find out everything you need to know about social engineering, including: Who can be targeted with a social engineering scheme Why these kinds of attacks are so effective How social engineering leverages human emotions to steal data The easy steps you can take to keep your data safe
Blog

What the Twitter Hack Revealed About Social Engineering

Less than a week ago, Twitter fell victim to a monumental security breach that saw hackers successfully orchestrate a social engineering attack and take over high-profile Twitter user accounts, including world-renowned companies like Apple and business magnates like Bill Gates and Elon Musk. The cybercriminals used that access to launch a bitcoin scam that generated over $120,000. The attack is...