10 real and famous cases of BEC (Business Email Compromise)
10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals
8 reasons to use DMARC in your business
8 reasons to use DMARC in your business A major cybersecurity problem is: hackers are always looking for new approaches and ways to abuse company brands and domains to trick
What is mail server?
What is mail server? We can say that an email server (or mail server) is your digital postal service. It’s a machine or application responsible for handling messages. In other
What are RUA and RUF in DMARC?
What are RUA and RUF in DMARC? DMARC (Domain-based Message Authentication Reporting & Conformance) is an email validation and authentication system used to detect fraud, such as phishing and impersonation,
10 real and famous cases of social engineering attacks
10 real and famous cases of social engineering attacks Social engineering is the tactic behind some of the most famous hacker attacks. It’s a method based on research and persuasion
Sextortion scam demands USD 2000 to not “ruin your life”
Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand
Gatefy: anti-spam and anti-phishing solution for your business
Gatefy: anti-spam and anti-phishing solution for your business If your company is looking for an anti-spam and anti-phishing solution, Gatefy will solve your problem. Gatefy Email Security (GES) is a
Phishing email: your Amazon account is being suspended
Phishing email: your Amazon account is being suspended We’re going to talk about a phishing campaign that has been using Amazon’s name and brand. The threat has been detected and
11 real and famous cases of malware attacks
11 real and famous cases of malware attacks Many cases of famous hacker attacks use malware at some point. For example, first, the cybercriminal can send you a phishing email.
10 LGPD principles that guide personal data processing
10 LGPD principles that guide personal data processing The principles of the LGPD (Brazilian General Data Protection Law) are the concepts and beliefs that support the law. It’s based on