If you missed our recent virtual fireside chat “Behind the Screens: North Korea’s Focus on DMARC in Email Espionage,” or couldn’t attend due to geographical restrictions, we’ve got you covered. Joined by cybersecurity experts from the Federal Bureau of Investigation (FBI) and Stanford University, together with Red Sift, the session explored how the North Korean…Continue Reading: Behind the Screens: North Korea’s Focus on DMARC in Email Espionage
Phishing
How to Protect Against Identity-Based Attacks?
As the digital world becomes more reliant on identity-based authorization for users, applications, and devices, it opens up the scope for identity-based attacks. This primarily targets the vulnerabilities in identity systems, aiming to exploit or manipulate them for malicious purposes. …Continue Reading: How to Protect Against Identity-Based Attacks?
The 8 biggest cyber threats faced by enterprises today and how to prevent them
As of 2022, the global average cost per data breach amounted to 4.35 million USD. Irrespective of the size and industry, all types of IT-driven enterprises are prone to impersonation-based cyber attacks like BEC (Business Email Compromise), whale phishing, DNS spoofing, social engineering, etc. …Continue Reading: The 8 biggest cyber threats faced by enterprises today and how to prevent them
What is spear phishing and how to protect your business?
Lately, spear phishing, a type of targeted phishing attack, has been expanding in volume and complexity, targeting big business brands and causing chaos for them. In this blog, we discuss the spear phishing definition, real-life examples, and ways to protect your business…Continue Reading: What is spear phishing and how to protect your business?
Spam vs Phishing: What’s the difference and why it matters?
Spam is generally harmless as it’s for marketing and sales purposes. Phishing, on the other hand, has a malicious intent of obtaining personal and sensitive details to attempt cyberattacks…Continue Reading: Spam vs Phishing: What’s the difference and why it matters?
NHS DCB1596 compliance is a great start, but here’s why your domain is still fair game
Healthcare remains one of the most targeted industries when it comes to cyberattacks. But DCB1596 compliance isn’t enough. In this blog, we’ll highlight the areas NHS trusts should address to secure themselves and their patients for the long term. …Continue Reading: NHS DCB1596 compliance is a great start, but here’s why your domain is still fair game