A large-scale business email compromise (BEC) campaign was detected by tech giants Microsoft that used using typo-squatted domains registered a few days before the attacks started for targeting more than 120 organizations. Various tactics are us... Read more
Before allowing junior administrators to take on solo projects of their own a few organizations hand them huge responsibilities for them to gain some on-the-job experience. Specific administrative access is delegated to user accounts so they can... Read more
Last week through our blog post we established that organizations need to conduct cybersecurity vulnerability assessments on a regular basis to secure their sensitive data ensuring their networks and systems cannot be exploited. However, a failu... Read more
Dridex is back to tormenting users again. It has marked its return with a phishing attack pretending to be invoiced from QuickBooks. The ongoing campaign that started on the 19th of April 2021 is targeting users of the accounting software and in... Read more
Let us start the article with a few questions – Do you frequently use the internet? Can you consider your mobile as your digital lifeline? Have you installed a lot of applications on your smartphone? If you have positively answered any of the ab... Read more