Phishing campaign that impersonates FBI director is back
Phishing campaign that impersonates FBI director is back It may sound like a joke, but in this not-so-new phishing scam, cybercriminals are trying to impersonate an FBI director to steal
6 steps to build an incident response plan
6 steps to build an incident response plan An incident response (IR) plan is a playbook that allows companies to act quickly in the event of cyberattacks and data breaches.
BEC remains the most damaging threat, says FBI
BEC remains the most damaging threat, says FBI According to the 2018 Internet Crime Report, gathered by the FBI, Business Email Compromise (BEC) and Email Account Compromise (EAC) attacks continue
What is the difference between bulk email, junk email and graymail?
What is the difference between bulk email, junk email and graymail? The question is simple but can still cause a lot of confusion: what’s bulk email, junk email and graymail?
5 baits used in phishing scams to lure you
5 baits used in phishing scams to lure you Everyone who knows a little bit more about cybersecurity knows that phishing is one of the top threats on the internet.
What is anti-spam?
What is anti-spam? The term anti-spam is used to refer to a software or to processes of detection and analysis that aim to block spam (or unwanted messages). The problem
Malware affects medical scan images and tricks radiologists
Malware affects medical scan images and tricks radiologists A group of researchers in Israel has developed a malware that can change medical scan images. The malware exploits vulnerabilities in MRI
The X-ray of a highly personalized spam campaign
The X-ray of a highly personalized spam campaign TechCrunch recently published an article of great interest sharing an in depth investigation that, with the support of security researcher Bob Diachenko,
Phishing scheme impersonated Apple to trick celebrities
Phishing scheme impersonated Apple to trick celebrities An American man pleaded guilty to applying phishing scams on celebrities using Apple’s name to steal credit card data. According to the Department
8 points to think about before choosing a sandbox solution
8 points to think about before choosing a sandbox solution Choosing a sandbox solution can be a simple task if you know what you are looking for. Otherwise, the numerous