-
24 November 2020What Is Social Engineering?When it comes to cyber-attacks, our thoughts jump immediately to malicious code and the misuse of technology. However,...
-
28 October 2020Your Office 365 Credentials Are Vulnerable To This MS Teams Phishing AttackIt is time you should probably review the safety of your Office 365 credentials. Recently, Microsoft Teams was...
-
26 October 2020This Pharma Lab Data Breach Caused Multiple Plants to Shut DownA successful data breach at Dr Reddy’s, a well-known pharmaceutical company, caused a total shutdown of multiple laboratories...
-
23 October 2020These two companies are favourites for spoofed emailsA quarterly report for cyber statistics has stated that two companies in particular have become go-to targets for...
-
18 October 2020Business Email Compromise: A Complete GuideEmail has become an inseparable part of any business. Sending invoices, making major decisions, updating your clients, scheduling...
-
10 October 2020Why Web Application Firewall Is a Must In Your Security ArsenalIf your organization is cyber aware, you doubtless have procured some services and tools for your network security....
-
7 October 2020Credentials Theft: A Case StudyCyber criminals keep creatively upping their game and this new phishing attack is proof of that. A new...
-
23 September 2020Major Data Breach of Government ComputersThe National Informatics Center (NIC) and the Ministy of Electronics & Information Technology (MeitY) suffered a data breach...
-
8 September 2020Look out for Covid-19 Related Cyber ScamsWhile regulations have lifted the restrictions of strict lockdowns, common sense and the growing number of Covid-19 cases...
-
7 September 2020Email Invoice Fraud Prevention – A Concise GuideBusiness owners are now growing increasingly aware of cyber security concerns hanging over their heads like a dark...
What Is Social Engineering?
24 Nov 2020