Cybersecurity

Recovery scammers target existing scam victims for second round

Posted: November 7, 2022 by Christopher Boyd These days, it pays to be on your guard for something referred to as a recovery scam. This is an increasingly popular technique which is absolutely rampant on certain quarters of social media. You may well have seen it yourself, without realizing. Either way, it’s quite the menace and essentially involves […]

Recovery scammers target existing scam victims for second round Read More »

Instagram scammer pleads guilty to money laundering, wire fraud, and wire fraud conspiracy

Posted: November 7, 2022 by Christopher Boyd The risks and rewards of getting up to no good on social media have been thrown into sharp focus, with news of a guilty plea in a case wrapped up in alleged wire fraud and “influencing”. 27 year old Jebara Igbara, known as “Jay Manzini” on Instagram where he has a

Instagram scammer pleads guilty to money laundering, wire fraud, and wire fraud conspiracy Read More »

Why Smart Tech Acceleration is Essential to Long-Term Business Growth

In your attempt to adapt to the evolving technology landscape and the onset of the COVID-19 pandemic, have you invested in solutions that may not be assisting your company in achieving its long-term goals? If so, you’re not alone. The rapid growth of technology shows no signs of slowing, and businesses have gradually begun to

Why Smart Tech Acceleration is Essential to Long-Term Business Growth Read More »

How Insiders Pose a Serious Threat to Your Business-Critical Data

Merely mitigating external cybersecurity threats isn’t enough to fight cybercrime in today’s ever-evolving threat landscape. Although insider threats can be just as devastating as their external counterparts, most businesses fail to track and manage insider threats adequately. Human error and malicious insider threat behavior are involved in the majority of breaches. In light of this,

How Insiders Pose a Serious Threat to Your Business-Critical Data Read More »

Raspberry Robin worm used as ransomware prelude

Posted: October 31, 2022 by Pieter Arntz Raspberry Robin aka Worm. RaspberyRobin  started out as an annoying, yet relatively low-profile threat that was often installed via USB drive. First spotted in September 2021, it was typically introduced into a network through infected removable drives, often USB devices. Now the worm has been found to be the foothold for more serious threats

Raspberry Robin worm used as ransomware prelude Read More »

Protecting Your Business-Critical Data From Insider Threats

Although today’s technology-driven era has made information sharing and data access very efficient, it has brought forth a new set of challenges. One of the primary challenges businesses face is the rising threat to data security. However, the threat to business data does not always come from external actors. Worryingly, the greatest threat to business-critical

Protecting Your Business-Critical Data From Insider Threats Read More »

4 Employee Cyberthreat Traits

To succeed in today’s modern competitive business landscape, you need to understand the strengths and weaknesses of your employees. This will equip you to identify areas where employees may need further training, including cybersecurity awareness. Are you sure that your employees can resist threats and prevent cyberattacks? Certain employee traits can indicate a lack of

4 Employee Cyberthreat Traits Read More »

Fake Proof-of-Concepts used to lure security professionals

Posted: October 27, 2022 by Pieter Arntz Researchers from the Leiden University published a paper detailing how cybercriminals are using fake Proof-of-Concepts (PoCs) to install malware on researchers’ systems. The researchers found these fake PoCs on a platform where security professionals would usually expect to find them—the public code repository GitHub. Use of PoCs There is a big difference between

Fake Proof-of-Concepts used to lure security professionals Read More »