Blog

Email attackers are increasingly using customized phishing campaigns to target users. Read more about these highly targeted attacks here.
Read more
Ransomware actors use double encryption to complicate the recovery process for victims so they will be more inclined to pay. Read to learn more about it here.
Read more
Phishers used a cross-site scripting (XSS) flaw in the UPS website to distribute malware using email subject line “UPS Delivery Exception: Action Required”.
Read more
Organizations need to be prepared to defend against ransomware. But what does “ransomware defense” mean and how does it look in practice? One word: prevention.
Read more
Malicious actors used emails carrying executable (.EXE) file attachments to target recipients with Demonware ransomware.
Read more
Data backups are a top security measure used for ransomware attack recovery, but having a robust data backup strategy is just as important. Here are some tips.
Read more
Phishers leveraged emails with the subject line “Payment Slip” to target unsuspecting users with samples of the Oski infostealer to steal bank data.
Read more
Knowing the common origins of new ransomware strains can help organizations defend their networks. From state-sponsored to RaaS, three origins are worth noting.
Read more
Data breaches that used email phishing as their initial attack vector cost organizations an average of $4.65 million, according to 2021 IBM report.
Read more
Digital attackers are misusing an email marketing service to trick recipients into handing over their Outlook account credentials.
Read more
Combined crypto-ransomware and double-extortion attacks empower greedy attackers to demand two ransoms: one for data decryption and one to delete stolen data.
Read more
Many consultancies see the MSP model as a natural next step to grow into a mature company. Yes, the MSP model can be more profitable, but where do you start?
Read more