Resources

Blog

Don’t Be A Victim of CEO Fraud

Everyone wants to look good in front of their boss. Which is exactly why an urgent email from the CEO of your company is guaranteed to catch your attention. You’re more likely to act on the request immediately without questioning the details. But what if that email didn’t come from your boss? All it takes is one savvy email that encourages an employee to act on behalf of...
Blog

19 Phishing Email Examples

Phishing attacks work because people don’t know what phishing looks like. These examples of phishing emails emphasize how easy it is to be tricked.
Blog

4 Examples of CEO Fraud and How to Prevent Them

Everyone wants to impress their boss, which is exactly what scammers rely on nowadays to carry out sophisticated phishing attacks called CEO fraud. Examples of CEO fraud are becoming increasingly common, with attackers regularly sending out phishing emails to an organization's employees and impersonating the top executive. This often comes with a demand at the end of the day...
Blog

6 Things to Learn from the Garmin Security Breach

As much as we can say that cyber security measures are advancing, we can say the same about cyber criminals and their strategies. In 2022, ransomware attacks occurred every 11 seconds on average, at a global annual cost to businesses and governments of $20 billion US. Costs are rising in part due to the growing ransoms demanded from victims. While estimates of the average...
Blog

Got Malware? The Risk of Buying This Smart ID Card Reader from Amazon

KrebsOnSecurity blog recently reported on a popular, low-cost Common Access Card (CAC) reader available on Amazon that came with drivers infected by malware. A compromised smart ID card reader can bring severe consequences to both government and private organizations. It gives hackers an easy backdoor means of infiltrating networks and systems, which can leave sensitive...
Blog

Is Your Personal Data Safe on Meta’s Social Media Platforms?

Not only are they burning through cash as they pivot toward the metaverse, but their struggles with data privacy are an ongoing issue. In many ways, Facebook/Meta’s data privacy troubles began in 2018, with revelations that a data-marketing firm had illegally collected the personal details of more than 80 million Facebook users. However, despite promises of improvements and...
Blog

How to Protect Your Sensitive Information from Word Document Malware

If you’re a company that uses email scanning technology as the first line of cyber defense, you should know about a recent slate of malicious Word document-based attacks. These attacks are designed to deliver malware and ransomware to targeted systems. Security researchers at Cisco Talos recently identified an attack where Word document files attached to emails were used to...
Blog

Gift Card Scams: How to Easily Spot and Avoid These Cyber Threats

Did you know that gift card scams are among the most popular cyber threats? The same things that make gift cards popular with consumers—convenience and ease of use—also make them attractive to scammers as a vehicle for fraud. Gift cards, also known as gift certificates or vouchers, have topped the list of reported fraud payment methods every year since 2018, according to the...
Blog

The Recent Dropbox Breach and What We Can Learn From It

On November 1st, 2022, Dropbox became the victim of a cyber attack where source code repositories, as well as names and emails of their employees, were unauthorizedly accessed. It is not yet clear how the unauthorized access took place, but Dropbox has said that they are investigating the matter. The company is urging all users to change their passwords as a precautionary...
Blog

Bell Canada Cyber Attack: What You Can Learn from This Data Breach

On September 15, the Hive ransomware group claimed to have launched an attack against Bell Technology Solutions on August 20, 2022. The compromised information contained approximately 1.9 million active email addresses, 1,700 names, and active phone numbers. Bell Technology Solutions is a subsidiary of Bell Canada, a leading communications company and communications provider...

5 Ways to Be Prepared for QR Code Scams

Restaurant menus worldwide have been replaced by QR codes stuck to the table during the COVID-19 pandemic. Physical menus were judged too difficult to clean and could act as infection vectors. Since everyone has a smartphone nowadays, QR codes were attractive alternatives instead of asking clients to type in the restaurant’s URL on their phones. Before, QR codes were mainly...
Guide

2021 Phishing Benchmark Global Report

The Phishing Benchmark Global Report provides organizations everywhere with data-driven insights from the latest Gone Phishing Tournament™, a free annual cyber security event that coincides with Cybersecurity Awareness Month. Drive effective behavior change and strengthen your security awareness training initiatives with in-depth benchmarking data and expert guidance. ...

What is Trap Phishing?

Trap phishing is one of the most valuable intelligence-gathering tools cyber criminals have at their disposal. Hackers routinely send out emails, phone calls, and messages to trick the recipients into handing over personal information, clicking on a web link,or downloading a malicious attachment and infecting their device. These trap phishing attacks, more commonly referred to...
Blog

5 Examples of Spear Phishing Attacks

When it comes to cyber crime, hackers like to locate the most high-value targets, whether it’s a piece of infrastructure or an individual with access to privileged information, all while expending the least effort possible. In most examples of spear phishing attacks, a criminal will send out targeted attacks via email to multiple users. In these emails, the attacker will use...
Blog

7 Types of Spoofing Attacks And How To Detect Them

Spoofing refers to an attack where hackers use various ways to disguise their identity so that their victims think they are talking to their coworker, boss, or business. The methods used to achieve this are the typical phishing tropes such as fake websites, links, and social engineering. When spoofing is involved, it’s often more helpful to focus on detecting the facade rather...
Blog

Top Examples of Malware Attacks

Malware is perhaps the most widely known out of all IT security threats. Since 1986, malware has become a significant concern for enterprise users, with recent examples including the Colonial Pipeline attack, Kaseya ransomware attack, and the SolarWinds Dark Halo breach. However, these attacks are just the tip of the iceberg, with many businesses falling victim to malware and...
On-Demand Webinar

Terranova Security and Microsoft Present the Latest Global Phishing Benchmarks and Recommendations

Get the latest phishing benchmarking statistics from the 2021 Gone Phishing Tournament and learn how they can strengthen your security awareness initiatives in the coming year by attending the Phishing Benchmark Global Report Results webcast event. Terranova Security and Microsoft present highlights from the Tournament’s results and answer questions like: What geographic...
Blog

What You Need to Know About the Kaseya Ransomware Outbreak

In early July, IT solutions provider and remote management solution provider Kaseya announced that it had fallen victim to a supply chain ransomware attack. During the attack, hackers leveraged a vulnerability in Kaseya’s VSA platform to encrypt the data of hundreds of downstream MSPs and their clients. The Kaseya ransomware outbreak is one of the latest high-profile...