Ransomware

4 Complex API Attacks

4 Complex API Attacks

In our previous article, we talked about how APIs were hacked and explained in detail the 8 weak points of APIs. Now it’s time to dig deeper into API attacks. In this article, we have compiled 4 examples of API attacks for you. Here are 5 Complex API Attacks! 4 [...]

Read more...
How to Organize a Social Engineering Attack

How to Organize a Social Engineering Attack

To protect our personal accounts and our company, it is very important that we be very careful and act appropriately whenever we are online. Therefore, in this article, we will provide you with information about social engineering types such as phishing, spear phishing, whaling, smishing and vishing. This way [...]

Read more...
How Hackers Work and Their Purposes

How Hackers Work and Their Purposes

We often define hackers as criminals or malicious people who illegally infiltrate our devices and networks. But actually hackers are just people who know computer systems and networks very well. Only some of them use their information in a way that causes illegal and unethical behavior. Others use their [...]

Read more...
7 Things You Should Teach in Training

7 Things You Should Teach in Training

In the past, hackers targeted consumers in their phishing attacks. That’s why the first priority of companies was to protect their consumers from malware. However, phishing is considered the biggest cyber attack for companies today and is responsible for almost 100% of security vulnerabilities. Since cyber security measures are [...]

Read more...
How to Protect Your Company Against Email Threats

How to Protect Your Company Against Email Threats

Email security is one of the most important points for the growth and development of companies. Cyber ​​threats can find you and your employees anywhere. If you really want to protect your company against the dangers of email services, you must be 100% sure of the security of your [...]

Read more...
Phishing Threat Campaigns

Phishing Threat Campaigns

Phishing Threat Campaigns – Who are the biggest targets of phishing threats? End-users are the most affected targets against phishing scams since they are targets of many spear-phishing attacks. 1. What are Phishing Threat Campaigns?  Phishing Threat Campaigns are used in phishing simulation campaigns which utilises many email scams that bypass the email [...]

Read more...