Know Your Enemy. Plan Your Defense

Organizations in the UK with 250 employees or less need a solid understanding of the attack potential, methods used, and how to prepare. The UK has faced its share of data...

CyberheistNews Vol 8 #28

Source link Based Blockchain Network

Ransomware Mid-Year Update: It’s Worse Than Ever

We’re finally getting a look at how much ransomware attacks have been seen in the wild in the first half of 2018 – and the numbers are astounding. Ransomware is alive...

Bad guys use Google’s Golang to cross-compile multi-platform malware

Here is the bad news: The use of Google's Golang (also called Go) programming language allows attackers to cross-compile malware for use on multiple platforms, making potential attacks on Linux...

What Would You Like To Ask Kevin Mitnick About Social Engineering?

Here's your chance. Late August we'll do a live webinar with Kevin, and he asked me to find out what questions you have for him regarding social engineering, so we...

9 New Training Modules From ThinkHR

Each of these is viewed within the Skillsoft player just like previous ThinkHR releases. These new releases include Workplace Harassment, EEO, FMLA and 4 new HIPAA courses. Please take note...

Mobile Phishing on the Rise

With users being three times more likely to click on a suspicious link on their mobile device, along with over half of mobile users tapping on a phishing URL, mobile...

[Scam Of The Week] Amazon Prime Day Is Only 4 days away

It's a prime opportunity for the bad guys to send a raft of phishing attacks. We do have a "Free Amazon Prime Account" template that we just modified to fit...

Just How Far Will Cybercriminals Go for a Scam? Apparently into Outer Space.

The Nigerian Prince scam was found taking a turn upwards to the stars, seeking your help to bring a poor lonely astronaut home.It seems the most well-known email scam around...

[Live Webinar] Why You Should Be Using Deception: Decoys, Honeypots, and Red Herrings

Every company in the world should be utilizing some form of deception as part of their overall computer security defense. Decoys...

LATEST NEWS

MUST READ