Social Engineering

Tailgating

Tailgating

In this blog, the topic of Tailgating comes under our information security microscope. This method of social engineering can be easily overlooked in the cyber security world with the same potentially fatal consequences of other common attacks such as phishing, spear phishing, whaling, baiting and watering holes. All involve [...]

Read more...
Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
MOBILE DEVICE SIDELOADING

MOBILE DEVICE SIDELOADING – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 3,

In our 3rd Episode of Season 2, we learn that a company’s payroll deposit went to hackers instead of employees, to the tune of $800,000.  While it might seem harmless at first , loading software from anywhere other than the manufacturer’s app store can be very risky.  Free is [...]

Read more...
REAL ESTATE WIRE FRAUD

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2

REAL ESTATE WIRE FRAUD – HOW IT REALLY HAPPENED: NINJIO SEASON 2, EPISODE 2 In our 2nd Episode of Season 2, a young family wires their 650k down payment for their new home to a fraudulent account. We come to find out that a hacker has taken over their real estate [...]

Read more...
Malware attacks have increased

Malware Attacks Have Increased 8 Times in the Last 10 Years

Malware attacks have increased 8 times in the last 10 years. Applications and devices must have machine IDs to securely communicate with each other upon authentication. However, whether it is a Kubernetes application or a serverless function in the cloud, machines prefer to use encryption keys and digital certificates used [...]

Read more...
Baiting

Baiting

In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating.  1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with [...]

Read more...
Watering Hole Attacks

Watering Hole Attacks

“What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can [...]

Read more...
social engineering

Social Engineering

Social engineering attacks have many different tactics and can be initiated by a number of means targeting humans. Social engineering techniques vary, however, we will discuss the five most common forms of social engineering attacks.  1.What is a Social Engineering Attack? A Social Engineering Attack is a method of obtaining confidential [...]

Read more...
A Phishing Simulation

Keep Your Institution Safe with A Phishing Simulation Software!

1- What is A Phishing Simulation? A Phishing simulation is a solution that trains individuals against cyber attacks that may come through email and helps individuals to be one step ahead of attacks. The simulation literally means “imitation, similar”,  which models a theoretical or physical system in a computer environment and [...]

Read more...
Telephone social engineering

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING

HOW IT REALLY HAPPENED: NINJIO SEASON 1, EPISODE 10, TELEPHONE SOCIAL ENGINEERING In Episode 10, a young finance executive is denied a job after his employer tells him that his credit rating is horrible.  He comes to find out that this was due to an identity theft issue originated by [...]

Read more...