Are governments prepared for cyber attacks?

Are governments prepared for cyber attacks?

Private companies aren’t the only target for cyber criminals. As we’ve seen in the past with attacks to major public infrastructure, such as the Colonial Pipeline in the US in May 2021, and public services, like the Wannacry attack on the NHS in 2017, threat actors...
The latest browser-based social engineering trend

The latest browser-based social engineering trend

As governments and companies become aware of cyber threats and close the door on certain methods, cyber criminals are constantly evolving to find a new way to attack.  The latest example, according to a recent report by WatchGuard, is a new type of browser-based...
How is management prioritising cybersecurity in 2023?

How is management prioritising cybersecurity in 2023?

Cybersecurity is becoming an increasingly important function within organisations, because the risk of not being prepared for an attack is now too high. Not only is there a higher likelihood of certain types of cyber attacks, but these types of threats are now seen as...
What is baiting and how to prevent it?

What is baiting and how to prevent it?

Baiting is a social engineering technique that cyber criminals use to lure victims by appealing to their greed or curiosity with a false promise. In the online world, this can take the form of an email telling you that you’ve won a competition or an advert offering...
International operation downs Qakbot malware infrastructure

International operation downs Qakbot malware infrastructure

A major digital sting operation, involving seven countries, resulted in the downing of a malware infrastructure that criminals have used to steal millions of dollars from their victims. The malware, Qakbot (also known as Qbot or Pinkslipbot) had been active since 2007...
Do demographic factors influence social engineering success?

Do demographic factors influence social engineering success?

Social engineering is one of the most successful tactics that cyber criminals can use to get access to confidential information or infiltrate company systems and networks. Its success depends on gaining trust. This is often done by using information that can be...