Blog
Email attackers are increasingly using customized phishing campaigns to target users. Read more about these highly targeted attacks here.
Read moreRansomware actors use double encryption to complicate the recovery process for victims so they will be more inclined to pay. Read to learn more about it here.
Read morePhishers used a cross-site scripting (XSS) flaw in the UPS website to distribute malware using email subject line “UPS Delivery Exception: Action Required”.
Read moreOrganizations need to be prepared to defend against ransomware. But what does “ransomware defense” mean and how does it look in practice? One word: prevention.
Read moreMalicious actors used emails carrying executable (.EXE) file attachments to target recipients with Demonware ransomware.
Read moreData backups are a top security measure used for ransomware attack recovery, but having a robust data backup strategy is just as important. Here are some tips.
Read morePhishers leveraged emails with the subject line “Payment Slip” to target unsuspecting users with samples of the Oski infostealer to steal bank data.
Read moreKnowing the common origins of new ransomware strains can help organizations defend their networks. From state-sponsored to RaaS, three origins are worth noting.
Read moreData breaches that used email phishing as their initial attack vector cost organizations an average of $4.65 million, according to 2021 IBM report.
Read moreDigital attackers are misusing an email marketing service to trick recipients into handing over their Outlook account credentials.
Read moreCombined crypto-ransomware and double-extortion attacks empower greedy attackers to demand two ransoms: one for data decryption and one to delete stolen data.
Read moreMany consultancies see the MSP model as a natural next step to grow into a mature company. Yes, the MSP model can be more profitable, but where do you start?
Read more