by djonon | Aug 18, 2022 | Phishing
Callback phishing is a specialized type of cyber-security email threat. In a Callback phishing attack, cyber-criminals attempt to impersonate a business through an email or a phone call to a target recipient claiming that a transaction initiated by the recipient has...
by djonon | Aug 1, 2022 | Phishing
DLL hijacking is a devastating attack method that takes advantage of how Dynamic Link Libraries (DLLs) are handled in Windows. It consists of creating a malicious version of a legitimate DLL required by the program and placing it early in the search order used to...
by djonon | Jul 6, 2022 | Phishing
Since the pandemic, working from home has become much more widespread worldwide and many companies around the world have embraced both remote and flexible ways of working. As the pandemic fades, many predict that remote working will remain prevalent across multiple...
by djonon | Jul 6, 2022 | Phishing
Phishing attacks range from classic email phishing schemes to more inventive approaches such as spear phishing and smishing. All have the same purpose – to steal your personal details. With a better understanding of the twelve types of phishing attacks and how to...
by djonon | Jul 6, 2022 | Phishing
Phishing is a widespread form of cyber-attack involving a target being contacted via email, phone, or text message by someone impersonating a legitimate organization with the goal of luring out sensitive data such as passwords or credit card details. Criminals...
by djonon | Jul 6, 2022 | Phishing
First introduced in 2012 by a consortium of industry leaders, Domain-based Message Authentication, Reporting and Conformance (DMARC) is an open standard authentication protocol that works with SPF and DKIM to prevent the fraudulent use of legitimate brands in email...