phishing

Security Awareness Training

Security Awareness Training

Enable your users to work securely, increase their level of cybersecurity awareness, and defend your organization’s valuable information.  See how our security awareness training programs can decrease the risk of phishing and social engineering attacks. Regarding cşber security awareness training, we think that the training library should be big, interactive, [...]

Read more...
Office 365 Phishing Attack Using Realtime Validation

Office 365 Phishing Attack Using Real-Time Validation

To steal Office 365 login information from users, criminals used a phishing attack that used real-time validation against an institution’s Active Directory. It was reported that the attack was made against an executive of a financial organisation.  The email, along with the subject line “ACH Debit Report,” used spoofing tactics [...]

Read more...
The Biggest Data Breaches in the first half of 2020

The Biggest Data Breaches in the first half of 2020

2020 Data Breaches – In this blog, we are going to talk about the big data breach that occurred in the first half of 2020.  Since the COVID-19 pandemic has forced companies to move their business to remote operations, there has been a significant increase in the number of data [...]

Read more...
Tailgating

Tailgating

In this blog, the topic of Tailgating comes under our information security microscope. This method of social engineering can be easily overlooked in the cyber security world with the same potentially fatal consequences of other common attacks such as phishing, spear phishing, whaling, baiting and watering holes. All involve [...]

Read more...
Instagram "Help Center" Phishing Attack

Instagram “Help Center” Phishing Attack

Instagram “Help Center” Phishing Attack 1- About This Phishing Attack Cyber Security Researchers warn against professional phishing attacks aimed at stealing user information that targets Instagram users and these phishing attacks being sent with direct messages via the application to users. Cyber Security Researchers stated that “Attackers are sending legitimate messages that [...]

Read more...
Why is phishing rising in the world

Why is Phishing Rising in the World?

The favourite move of cybercriminals is phishing attacks. According to the report presented by RSA in the first quarter of 2020, there is a huge increase in phishing emails including the COVID-19 title. Cybercriminals attempting to take advantage of both company employees and people and can be said that [...]

Read more...
A New Outlook Phishing Attack Targeting Banks

New Outlook Themed Phishing Attack on Banking Sector

In this article, we are going to provide some information about the new outlook phishing attack targeting some employees working in the banking sector from Keepnet customers. 1-What is the new outlook phishing attack? How does it work? Recently the attackers have planned to penetrate companies by sending a phishing email [...]

Read more...
Tesla Ransomware attack

How Did Tesla Ransomware Attack Happen?

A serious ransomware attack targeted Tesla. Tesla CEO Elon Musk explained in a Tweet that a 27-year-old Russian citizen was trying to persuade an insider and offered him a million-dollar payment in exchange for installing a ransomware into the system and helping to trigger it. Prosecutors did not name the [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
MOBILE DEVICE SIDELOADING

MOBILE DEVICE SIDELOADING – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 3,

In our 3rd Episode of Season 2, we learn that a company’s payroll deposit went to hackers instead of employees, to the tune of $800,000.  While it might seem harmless at first , loading software from anywhere other than the manufacturer’s app store can be very risky.  Free is [...]

Read more...