How Cybercriminals Exploit Human Vulnerabilities Phishing Attacks

2023-07-27T18:27:17-06:00May 16th, 2023|Tags: , , , , , , , , , |

Phishing attacks have gotten super tricky! Cybercriminals are now targeting our emotional weak spots to trick us into giving away sensitive information. In this article, we'll dive into their sneaky tactics and reveal how they use psychology to exploit us. [...]

Cyber Attacks – Learn about some of the most common types of attacks.

2023-05-15T11:28:34-06:00May 5th, 2023|Tags: , , , , , , , , , , |

Today's cybercriminals are not part-time amateurs or script kiddies, but state-sponsored adversaries and professional criminals looking to steal information. While disruption and vandalism are still prevalent, espionage has replaced hacktivism as the second main driving force behind cyber attacks, after [...]

What is Data Loss Prevention (DLP)? Lack of data protection policies can become a big problem!

2023-03-15T11:35:29-06:00March 13th, 2023|Tags: , , , , , , , , , , , |

What is Data Loss Prevention? Data loss prevention (DLP) is a cybersecurity methodology that combines technology and best practices to prevent the exposure of sensitive information outside of an organization, especially regulated data such as personally identifiable information (PII) and [...]

Phishing, Malware, Ransomware / Who do you Trust for Email Security and Protection?

2023-03-13T15:56:43-06:00February 28th, 2023|Tags: , , , , , , , , , , , |

The need for Email Security is greater now than ever before. As more companies move from "in-house - dedicated email servers" to cloud based email, new technologies must be employed to protect you data and sensitive information. Email is one [...]

What appears as document from DocuSign is really a phishing attack with embedded htm malware

2023-01-25T17:19:41-07:00January 19th, 2023|Tags: , , , , , , , , , , , |

The Blank Image Attack is where hackers are placing blank images within HTML attachments. When opening the attachment, the user is automatically redirected to a malicious URL. Vector: Email Type: Malware Techniques: Social Engineering, Blank Image, HTML Redirect Target: Any [...]

Apple sues NSO Group to curb the abuse of state-sponsored spyware

2021-11-24T14:56:23-07:00November 23rd, 2021|Tags: , , , , , , , , , |

Apple today filed a lawsuit against NSO Group and its parent company to hold it accountable for the surveillance and targeting of Apple users. The complaint provides new information on how NSO Group infected victims’ devices with its Pegasus spyware. To prevent [...]

Go to Top