Phishing Simulation

Instagram "Help Center" Phishing Attack

Instagram “Help Center” Phishing Attack

Instagram “Help Center” Phishing Attack 1- About This Phishing Attack Cyber Security Researchers warn against professional phishing attacks aimed at stealing user information that targets Instagram users and these phishing attacks being sent with direct messages via the application to users. Cyber Security Researchers stated that “Attackers are sending legitimate messages that [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...
Phishing security test tool

Badge Surfer Attack – Physical Security – SAUDI ARAMCO BREACH

Badge Surfer Attack – Phishing security test  tool – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 1, SAUDI ARAMCO BREACH In our 1st Episode of Season 2, one of the world’s largest oil producers has roughly 35,000 of its computers shut down in a matter of hours due to [...]

Read more...
Phishing attacks

Antivirus Tools Can’t Stop Phishing Attacks

Phishing attacks have been a pressing issue due to their success rate.  Antivirus tools /anti-virus software can identify known threats and contain them, however, when using social engineering tactics, like pushing or spear-phishing attacks, malware can bypass anti-virus technologies and it can take hours for antivirus technology vendors to [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...
Phishing Awareness Training

Phishing Awareness Training: 12 Things Your Employees Should Know for Phishing Protection

Phishing Awareness Training: 12 Things Your Employees Should Know for Phishing Protection Phishing attacks have been a widespread problem, posing a huge risk to individuals and institutions. According to Garner, According to Gartner, phishing emails will continue to be the primary method used by advanced attacks.  Because it is simple [...]

Read more...
phishing training for employees

Phishing training for employees

Phishing training for employees Is phishing your own employee a necessity ? The answer is yes.  Because phishing is one of the most successful ways cyber criminals access to companies’ passwords and other security credentials. Cyber criminal impersonate a legitimate person or entity, sends a fake email to manipulate employees [...]

Read more...
Phishing Software

Phishing test software

Phishing test software No matter how secure your network, or computers system and softwares, the weakest link in security posture,  people element can be exploited. Via phishing techniques, the most common social engineering techniques used in cyber attacks, it is easy to impersonate people acquainted, and get the information needed. [...]

Read more...
Data Breach: covert redirect

Data breach: covert redirect

Covert Redirect is a security breach and occurs when cyber hackers use open routing. Open redirects are not successful in checking whether the redirected URL is a valid URL. Cybercriminals who use covert redirect take advantage of this weakness, open a fake login window, steal login information, and redirect [...]

Read more...