10 real and famous cases of BEC (Business Email Compromise)
10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals aim to trick and persuade employees to take a specific action, such as making a wire transfer, providing funds to
Sextortion scam demands USD 2000 to not “ruin your life”
Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand
Gatefy: anti-spam and anti-phishing solution for your business
Gatefy: anti-spam and anti-phishing solution for your business If your company is looking for an anti-spam and anti-phishing solution, Gatefy will solve your problem. Gatefy Email Security (GES) is a
Spear Phishing
Go back to gatefy.com EMAIL THREAT Spear Phishing Spear phishing is a targeted fraud. That is, criminals focus their attacks on a specific group of people or companies. Therefore, it
BEC (Business Email Compromise)
Go back to gatefy.com EMAIL THREAT BEC – Business Email Compromise BEC is an advanced fraud and one of the top threats to business and corporate email. The BEC is
Phishing email: your Amazon account is being suspended
Phishing email: your Amazon account is being suspended We’re going to talk about a phishing campaign that has been using Amazon’s name and brand. The threat has been detected and
11 real and famous cases of malware attacks
11 real and famous cases of malware attacks Many cases of famous hacker attacks use malware at some point. For example, first, the cybercriminal can send you a phishing email.
Browse by category
10 real and famous cases of BEC (Business Email Compromise)
10 real and famous cases of BEC (Business Email Compromise) BEC (Business Email Compromise) scams have been a major concern for businesses and governments. In this type of attack, cybercriminals
8 reasons to use DMARC in your business
8 reasons to use DMARC in your business A major cybersecurity problem is: hackers are always looking for new approaches and ways to abuse company brands and domains to trick
What is mail server?
What is mail server? We can say that an email server (or mail server) is your digital postal service. It’s a machine or application responsible for handling messages. In other
What are RUA and RUF in DMARC?
What are RUA and RUF in DMARC? DMARC (Domain-based Message Authentication Reporting & Conformance) is an email validation and authentication system used to detect fraud, such as phishing and impersonation,
10 real and famous cases of social engineering attacks
10 real and famous cases of social engineering attacks Social engineering is the tactic behind some of the most famous hacker attacks. It’s a method based on research and persuasion
Sextortion scam demands USD 2000 to not “ruin your life”
Sextortion scam demands USD 2000 to not “ruin your life” Sextortion campaigns continue to flood email boxes of several people. These scams generally have the same modus operandi. To understand