Tag - threat simulation

Whaling

Whaling

In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the [...]

Read more...
Baiting

Baiting

In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating.  1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with [...]

Read more...
Watering Hole Attacks

Watering Hole Attacks

“What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can [...]

Read more...
anti-phishing solution

10 Email Security Risks in 2020

Anti-phishing solution: Use our threat simulation and conduct an email security gap analysis. Due to growing number of need for online communication, email remains top security concern or for some a weakness in 2020. When it comes to email security, classic measures like the latest antivirus software will never block [...]

Read more...
Email Security 7 Biggest Threats

Email Security: 7 Biggest Threats

Email security is one of the most important step that you should stop attackers to compromise your company! For effective email security protection, companies must be aware of the 7 biggest threats to avoid cyber attacks. In order to avoid these threats, and guarantee email security, learn these 7 threats: [...]

Read more...