10 real and famous cases of BEC (Business Email Compromise)
10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals aim to trick and persuade employees to take a specific action, such as making a wire transfer, providing funds to
5 tricks used in emails to deliver malware
5 tricks used in emails to deliver malware The combination of malware and email is a dangerous one. These terms are closely related to each other since email is the
What is LGPD, the Brazilian General Data Protection Law?
What is LGPD, the Brazilian General Data Protection Law? Today we’re going to explain more succinctly what LGPD is, its main points, and how it interferes in your routine or
Check out the key points from Europol’s spear phishing report
Check out the key points from Europol’s spear phishing report Europol has released a new cybersecurity report, this time specifically on spear phishing. Yes, spear phishing scams are multiplying. By
Ransomware named top 2019 cyber threat, according to Europol
Ransomware named top 2019 cyber threat, according to Europol According to Europol’s 2019 report, the Internet Organized Crime Threat Assesment (IOCTA), ransomware remains the main threat from the cyber world.
A USD 26 billion scam, according to the FBI
A USD 26 billion scam, according to the FBI BEC/EAC (Business Email Compromise and Email Account Compromise) is a type of advanced scam that uses social engineering and device intrusion
6 tactics used by criminals to steal your credit card information
6 tactics used by criminals to steal your credit card information The sad thing about credit card information theft is that, most of the time, you’ll only discover the fraud
How machine learning is related to big data
How machine learning is related to big data Machine learning and big data have a crucial relationship within technology processes, including cybersecurity. By themselves these tools are already major advances
6 common cybersecurity mistakes made by IT leaders
6 common cybersecurity mistakes made by IT leaders IT staff is generally responsible for keeping the organization safe and secure. That is, free of threats and breaches. However, as with
Check out the main cyberwarfare incidents from the past year
Check out the main cyberwarfare incidents from the past year The increasing use of digital hacking tactics by hackers and governments in countries such as the US, Russia and China
Can malware hack and steal your email account?
Can malware hack and steal your email account? Malware is malicious software that can infect your computer and execute harmful actions without your permission. The term is quite broad and