+44 (0)203 88 020 88

0
0
Subtotal: £0.00

No products in the basket.

No products in the basket.

Menu

Search

Social Engineering

Microsoft Teams Used in Social Engineering Attacks

Highly targeted phishing attacks have been carried out by the threat actor Midnight Blizzard, previously known as NOBELIUM, via Microsoft Teams. These attacks targeted a range of organisations including government and non-government organisations, IT services, technology businesses, manufacturing, and media companies. Through social engineering techniques Midnight Blizzard were able to achieve token and credential theft […]

Microsoft Teams Used in Social Engineering Attacks Read More »

Twilio Targeted in Latest ‘0ktapus’ Phishing Attacks

A large-scale phishing attack was recently launched against employees at Twilio, a global cloud-based communications and infrastructure company. Phishing text messages were sent to employees, impersonating Twilio’s IT department, with the aim of harvesting employee credentials. These stolen credentials were used to access internal systems, resulting in a breach of confidentiality in which the data

Twilio Targeted in Latest ‘0ktapus’ Phishing Attacks Read More »

Phishing Attacks That Can Bypass MFA

A large-scale phishing attack campaign has emerged using adversary-in-the-middle (AiTM) to steal credentials and circumvent multi-factor authentication (MFA) needs. Microsoft have released a security blog post regarding the use of these phishing attacks and the impersonation of Microsoft Azure Active Directory (Azure AD) login pages. This campaign has reportedly targeted over 10,000 organisations in the

Phishing Attacks That Can Bypass MFA Read More »

How the Phone-Wiping Banking Trojan BRATA is Becoming a More Advanced Threat

First discovered in 2019, BRATA malware is contained in a malicious app which victims are tricked into installing on their phones. BRATA is a banking Trojan that gains access to your bank, withdraws your funds, and then wipes your phone with a factory reset to hide the evidence of its activities.  BRATA stands for “Brazilian

How the Phone-Wiping Banking Trojan BRATA is Becoming a More Advanced Threat Read More »

How To Become An Ethical Hacker

Everyone has heard of hacking, but not many will know of its less-sinister counterpart, ethical hacking. Rather than the image of an evil villain breaking into important software in a dingy basement, imagine someone working alongside important companies and training them in techniques to prevent malicious attacks to their system. Ethical hacking is quickly becoming

How To Become An Ethical Hacker Read More »

Online Safety For Kids

Early use of digital technology has been shown to improve language skills in young children, as well as helping to promote their creativity and social development. However, it’s not without risks. Threats to children online include cyberbullying and harassment, invasions of privacy, exposure to inappropriate content and dangerous sexual online activities.  You might be asking

Online Safety For Kids Read More »

stay safe from phishing emails

10 Ways to Protect Yourself from Phishing Attacks

Email-based phishing attacks continue to soar at an all-time high. According to the State of the Phish™ Report 2018 by Wombat Security, it was reported that 76% of information security professionals had experienced phishing attacks against their organisations in 2017. As businesses and individuals, we continue to be plagued by phishing emails, which in some

10 Ways to Protect Yourself from Phishing Attacks Read More »

Scroll to Top