phishing awaraness training

Instagram "Help Center" Phishing Attack

Instagram “Help Center” Phishing Attack

Instagram “Help Center” Phishing Attack 1- About This Phishing Attack Cyber Security Researchers warn against professional phishing attacks aimed at stealing user information that targets Instagram users and these phishing attacks being sent with direct messages via the application to users. Cyber Security Researchers stated that “Attackers are sending legitimate messages that [...]

Read more...
INTERNET OF THINGS (IOT) - HOW IT REALLY HAPPENED

INTERNET OF THINGS (IOT) – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 4,

INTERNET OF THINGS (IOT) – HOW IT REALLY HAPPENED In NINJIO’s Season 2, Episode 4, a CEO’s celebration takes an ugly turn as he begins to destroy his printer with a champagne bottle. Turns out, his printer, along with many other IoT devices caused the internet to crash and cost [...]

Read more...
Tesla Ransomware attack

How Did Tesla Ransomware Attack Happen?

A serious ransomware attack targeted Tesla. Tesla CEO Elon Musk explained in a Tweet that a 27-year-old Russian citizen was trying to persuade an insider and offered him a million-dollar payment in exchange for installing a ransomware into the system and helping to trigger it. Prosecutors did not name the [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System

Ransomware Attack Shut Down School System. On the first day of elementary school students starting online classes, the Haywood school system was hit by a ransomware attack. 1. How Ransomware Attack Shut Down School System? The attackers demanded a large amount of money to restore the system, but the ransom amount was not unveiled [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...
Baiting

Baiting

In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating.  1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with [...]

Read more...
Watering Hole Attacks

Watering Hole Attacks

“What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can [...]

Read more...
Phishing security test tool

Badge Surfer Attack – Physical Security – SAUDI ARAMCO BREACH

Badge Surfer Attack – Phishing security test  tool – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 1, SAUDI ARAMCO BREACH In our 1st Episode of Season 2, one of the world’s largest oil producers has roughly 35,000 of its computers shut down in a matter of hours due to [...]

Read more...
Phishing attacks

Antivirus Tools Can’t Stop Phishing Attacks

Phishing attacks have been a pressing issue due to their success rate.  Antivirus tools /anti-virus software can identify known threats and contain them, however, when using social engineering tactics, like pushing or spear-phishing attacks, malware can bypass anti-virus technologies and it can take hours for antivirus technology vendors to [...]

Read more...