Cyber security awareness training

Security Awareness Training

Security Awareness Training

Enable your users to work securely, increase their level of cybersecurity awareness, and defend your organization’s valuable information.  See how our security awareness training programs can decrease the risk of phishing and social engineering attacks. Regarding cşber security awareness training, we think that the training library should be big, interactive, [...]

Read more...
Office 365 Phishing Attack Using Realtime Validation

Office 365 Phishing Attack Using Real-Time Validation

To steal Office 365 login information from users, criminals used a phishing attack that used real-time validation against an institution’s Active Directory. It was reported that the attack was made against an executive of a financial organisation.  The email, along with the subject line “ACH Debit Report,” used spoofing tactics [...]

Read more...
Ransomware Infection

The Services That Were Used For Ransomware Infection?

Ransomware Infection – While ransomware generating hackers are heavily targeting vulnerabilities in Citrix and Pulse Secure VPN software to infiltrate corporate networks in the first half of 2020, some ransomware targets the vulnerable or risky Windows Remote Desktop Protocol (RDP). Ransomware attacks targeting the business sector reached the Top for [...]

Read more...
INTERNET OF THINGS (IOT) - HOW IT REALLY HAPPENED

INTERNET OF THINGS (IOT) – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 4,

INTERNET OF THINGS (IOT) – HOW IT REALLY HAPPENED In NINJIO’s Season 2, Episode 4, a CEO’s celebration takes an ugly turn as he begins to destroy his printer with a champagne bottle. Turns out, his printer, along with many other IoT devices caused the internet to crash and cost [...]

Read more...
A New Outlook Phishing Attack Targeting Banks

New Outlook Themed Phishing Attack on Banking Sector

In this article, we are going to provide some information about the new outlook phishing attack targeting some employees working in the banking sector from Keepnet customers. 1-What is the new outlook phishing attack? How does it work? Recently the attackers have planned to penetrate companies by sending a phishing email [...]

Read more...
Tesla Ransomware attack

How Did Tesla Ransomware Attack Happen?

A serious ransomware attack targeted Tesla. Tesla CEO Elon Musk explained in a Tweet that a 27-year-old Russian citizen was trying to persuade an insider and offered him a million-dollar payment in exchange for installing a ransomware into the system and helping to trigger it. Prosecutors did not name the [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
MOBILE DEVICE SIDELOADING

MOBILE DEVICE SIDELOADING – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 3,

In our 3rd Episode of Season 2, we learn that a company’s payroll deposit went to hackers instead of employees, to the tune of $800,000.  While it might seem harmless at first , loading software from anywhere other than the manufacturer’s app store can be very risky.  Free is [...]

Read more...
Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System. On the first day of elementary school students starting online classes, the Haywood school system was hit by a ransomware attack. 1. How Ransomware Attack Shut Down School System? The attackers demanded a large amount of money to restore the system, but the ransom amount was not unveiled [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...