Resources

Blog

The 5 Most Spoofed Brands in the World

“On the internet, nobody knows you’re a dog.”     Cartoon by Peter Steiner There’s a reason this cartoon gained popularity in 1993 and has now become an iconic representation of how the internet works. The internet provides a way for people to hide their real identities, which can unfortunately lead to dishonest activities. Nowadays, scammers take advantage of this to...
Blog

The Definitive Guide to Cyber Security in Cryptocurrency

Even after years of business evolution; it’s shocking that safe, quick and trackable payments are still often such a struggle for many companies around the world. Banks are often slow-moving institutions that are late to embrace technological improvements, and currencies have been increasingly fickle in recent years. This situation is what allowed cryptocurrency to go from the...
Blog

Don’t Be A Victim of CEO Fraud

Everyone wants to look good in front of their boss. Which is exactly why an urgent email from the CEO of your company is guaranteed to catch your attention. You’re more likely to act on the request immediately without questioning the details. But what if that email didn’t come from your boss? All it takes is one savvy email that encourages an employee to act on behalf of...
Blog

The Crypto Crash: How it Affects Cyber Security in 2023 and What to Do About It

The crypto market has been on a wild ride over the past few years, with prices soaring to all-time highs in 2017 and then crashing just as dramatically in 2018. And while the market has been relatively stable in recent months, many experts predict another crash in 2023. But what does this mean for cyber security? In this article, we’ll explore the potential effects of the...
Blog

4 Examples of CEO Fraud and How to Prevent Them

Everyone wants to impress their boss, which is exactly what scammers rely on nowadays to carry out sophisticated phishing attacks called CEO fraud. Examples of CEO fraud are becoming increasingly common, with attackers regularly sending out phishing emails to an organization's employees and impersonating the top executive. This often comes with a demand at the end of the day...
Blog

7 Types of Spoofing Attacks And How To Detect Them

Spoofing refers to an attack where hackers use various ways to disguise their identity so that their victims think they are talking to their coworker, boss, or business. The methods used to achieve this are the typical phishing tropes such as fake websites, links, and social engineering. When spoofing is involved, it’s often more helpful to focus on detecting the facade rather...
Blog

What You Need to Know About The Office-365 Phishing Campaign Targeting C-Suite Executives

During the last week of January 2021, cyber security provider TrendMicro shared a blog post highlighting an Office-365 phishing campaign that criminals have targeted executives within manufacturing, tech, real estate, government, and finance since May 2020. As part of the scam, fraudsters sent the victims fake emails with links to a phishing site, where they harvested their...
Blog

Don’t Be Fooled By A Spoofing Attack

Know how to identify and prevent a spoofing attack Spoofing attacks are the ultimate form of cybercriminal trickery and deception. Cybercriminals disguise themselves and rely on trust to steal confidential information, install ransomware, and commit other cybercrimes. Spoofing comes down to trust. Cybercriminals hide behind trusted people, domains, URLs, and the technical...