• The Human Firewall – How Social Engineering Breaches Your Defenses

    The Human Firewall – How Social Engineering Breaches Your Defenses

    Imagine, for a moment, you’re a criminal scheming to breach a highly secured target. It could be a bank brimming with cash, a boutique filled with luxury items, or perhaps you’re a hacker eyeing the digital vaults of a health insurance company or an e-commerce giant. In orchestrating your intrusion, two primary avenues present themselves…

  • You Clicked on a Phishing Link, Now What?

    You Clicked on a Phishing Link, Now What?

    We all experience that “uh-oh moment” from time to time. It’s that moment you wake up and realize you left your credit card sitting on the table at the restaurant last night. Fortunately, it only takes a phone call to cancel the card and receive a new one in two days. If you had left…

  • Defending Your Email Infrastructure

    Defending Your Email Infrastructure

    Email is an incredible tool for businesses, but it’s also an equally incredible tool for threat actors, consistently remaining the most popular attack vector for hackers looking to gain access into an organization. And it’s not hard to see why. When planning an attack, the decisive question for a hacker is, “Will it be easier…

  • Timing – A Hackers Greatest Weapon

    Timing – A Hackers Greatest Weapon

    If you ever have the opportunity to talk to someone in charge of security at a maximum penitentiary, they will tell you the same thing. The prisoners have all the time in the world. All the time to watch and observe, looking for vulnerabilities within the patterned behaviors of the guards and penitentiary staff. They…

  • Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense

    Phishing-Resistant MFA Proves Again That Weak Links Should Be Layered with Defense

    Cybersecurity is a constant game of the cat chasing the mouse. The cat (a business) continues to believe that with each new plan of attack (i.e., security strategy or tool), it will finally be able to catch the mouse or, in this case, harden its security posture enough to prevent the mouse (a bad actor)…

  • CYREBRO’s Fraud Analysis Sheds Light on How to Fight Against BEC and Fraud

    CYREBRO’s Fraud Analysis Sheds Light on How to Fight Against BEC and Fraud

    Fraud is nothing new and has existed well before the world wide web came into play. But with constant digital transformations and advancements in technology, it’s expected that fraud too will evolve and shift, becoming ever more dangerous and complex. Con artists continue to keep up with security trends, including digital resources, content, and organizational…

Loading

Sign Up for Updates