Gatefy

Men hand shaking in one of the potential business email compromise cases

10 real and famous cases of BEC (Business Email Compromise)

10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals aim to trick and persuade employees to take a specific action, such as making a wire transfer, providing funds to

Publicação

Últimas publicações

Emails deliver malware and fish hook gets its content

5 tricks used in emails to deliver malware

5 tricks used in emails to deliver malware The combination of malware and email is a dangerous one. These terms are closely related to each other since email is the

Publicação
LGPD in Brazilian justice

What is LGPD, the Brazilian General Data Protection Law?

What is LGPD, the Brazilian General Data Protection Law? Today we’re going to explain more succinctly what LGPD is, its main points, and how it interferes in your routine or

Publicação
Europol report talking about phishing

Check out the key points from Europol’s spear phishing report

Check out the key points from Europol’s spear phishing report Europol has released a new cybersecurity report, this time specifically on spear phishing. Yes, spear phishing scams are multiplying. By

Publicação
IOCTA report talking about prejudice

Ransomware named top 2019 cyber threat, according to Europol

Ransomware named top 2019 cyber threat, according to Europol According to Europol’s 2019 report, the Internet Organized Crime Threat Assesment (IOCTA), ransomware remains the main threat from the cyber world.

Publicação
Thief stealing a billion-bag in a scam

A USD 26 billion scam, according to the FBI

A USD 26 billion scam, according to the FBI BEC/EAC (Business Email Compromise and Email Account Compromise) is a type of advanced scam that uses social engineering and device intrusion

Publicação
Emails deliver malware and fish hook gets its content

6 tactics used by criminals to steal your credit card information

6 tactics used by criminals to steal your credit card information The sad thing about credit card information theft is that, most of the time, you’ll only discover the fraud

Publicação
Processor with the whole world of a big data inside of a machine learning software

How machine learning is related to big data

How machine learning is related to big data Machine learning and big data have a crucial relationship within technology processes, including cybersecurity. By themselves these tools are already major advances

Publicação
IT leader commiting cybersecurity mistakes and worried in front of a server and a computer

6 common cybersecurity mistakes made by IT leaders

6 common cybersecurity mistakes made by IT leaders IT staff is generally responsible for keeping the organization safe and secure. That is, free of threats and breaches. However, as with

Publicação
World map showing cyberwarfare incidents from a hacker's computer

Check out the main cyberwarfare incidents from the past year

Check out the main cyberwarfare incidents from the past year The increasing use of digital hacking tactics by hackers and governments in countries such as the US, Russia and China

Publicação
Woman's email account being fish from phishing with malware that steals

Can malware hack and steal your email account?

Can malware hack and steal your email account? Malware is malicious software that can infect your computer and execute harmful actions without your permission. The term is quite broad and

Publicação