Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around.  Whenever there is something big in the news, you can bet that there will be criminals who will exploit it.  It has never been more...
Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats

Employee Training Key to Spotting Existing and Emerging Threats We have entered a new phase of sophisticated frauds that can devestate organizations.  Knows as Deep fake fraud, hackers use machine learning and other artificial intelligence tools to manipulate voice,...

Social Engineering Comes to the Forefront of Attacks

Social Engineering Comes to the Forefront of Attacks We depend on our smart devices and use them as a primary communication tool. Studies found that young adult users send over 2000 texts per month and receive over 1800 with that volume people are less wary, and it is...
Attackers Are Landing Email Inboxes Without The Need To Phish

Attackers Are Landing Email Inboxes Without The Need To Phish

Attackers Are Landing Email Inboxes Without The Need To Phish We’ve all heard the proverb: Give a man a fish and you feed him for a day. Teach a man to fish and you feed him for a lifetime. Well now, threat actors don’t even have to exert the effort to phish to land...