[gtranslate]
Man falling in a new extortion scam

New extortion and phishing scams threaten your business

New extortion and phishing scams threaten your business We received here at Gatefy a new email threat. An attempt of extortion, filtered by our system. In the email, the attacker

Publicação
Cybercriminals use machine learning to attack with malwares

7 ways in which cybercriminals use machine learning to hack your business

7 ways in which cybercriminals use machine learning to hack your business Machine learning (ML) is one of the main pillars of cybersecurity. This branch of artificial intelligence (AI) is

Publicação
Baits used at phishing to a business woman's computer

5 baits used in phishing scams to lure you

5 baits used in phishing scams to lure you Everyone who knows a little bit more about cybersecurity knows that phishing is one of the top threats on the internet.

Publicação
Email icon arriving as scams exploiting Gmail

Scams exploiting “dots don’t matter” in Gmail continue

Scams exploiting “dots don’t matter” in Gmail continue Cybercriminals continue to apply phishing and BEC (Business Email Compromise) scams exploiting the fact that “dots don’t matter in Gmail addresses”, using

Publicação
Cybercriminal attacking with an email impersonation scam and saying that's easy

The trend of email impersonation attacks

The trend of email impersonation attacks Email impersonation attacks are one of the fastest growing types of attacks in the world, reaching out to different markets and companies of all

Publicação
Free tickets scam in a wall

The threatening and viral scam of free tickets

The threatening and viral scam of free tickets That free ticket message you see circulating on Facebook, Twitter, WhatsApp or any other social media or that you’re receiving in your

Publicação
Skull on fire in a designer computer showing one of many malware evasion techniques

8 most common malware evasion techniques

8 most common malware evasion techniques Malware evasion techniques are a real problem for cybersecurity. After all, what matters to a malware author is to keep his creation invisible. At

Publicação
Bug as a malware in malicious Images

Can images contain malicious code and malware?

Can images contain malicious code and malware? That photo you just received might not be a simple image. It could be an image that can hack your device and cause,

Publicação
Malicious email hide a cyber threat in dangerous subjects

10 most common and dangerous email subjects

10 most common and dangerous email subjects We talk so much about email protection because email is the most frequently used tool for cybercriminals to commit scams and frauds. It’s

Publicação
Magnifier showing common email threats

6 most common email threats explained

6 most common email threats explained There is an old proverb that says something like “it’s not enough to go to the river with the intention of fishing; you must

Publicação