Imagine getting a video call from your CEO. They look right. They sound right. They ask you to wire money to close an urgent deal. You do it. The next day, you find out it was not your CEO at all. It was an AI-generated fake. This actually happened. In 2024, an employee at a… Read more »
Posts Tagged: hacker
Ransomware Protection for Small Businesses: 4 Steps to Take Right Now
In Part 1 of this series, we covered how Ransomware-as-a-Service has made small businesses the primary target – including how double extortion, triple extortion, and supply chain attacks have changed the threat landscape. If you missed it, start there first. Ransomware protection for small businesses does not require an enterprise security budget. Most successful ransomware… Read more »
Ransomware as a Service: Why Small Businesses Are the Target
Ransomware as a service has turned small business cybersecurity into a crisis. Where attacks once required technical skill, today any criminal can rent a professional ransomware kit, launch it within hours, and walk away with a share of the ransom. This model – called Ransomware-as-a-Service, or RaaS – has fundamentally shifted who gets attacked and… Read more »
AI Scams: What Small Organizations Should Expect
Over the past year, cybercriminals have adopted artificial intelligence faster than most legitimate organizations. Tools that used to require technical expertise are now inexpensive, automated, and disturbingly convincing. For small organizations, this shift means one thing: traditional “see something suspicious” instincts are no longer enough. Here is what leaders should expect — and how to… Read more »
What is DKIM Authentication?
Getting your email into a prospect’s inbox is already challenging. The last thing any organization wants is for a phishing or spoofing attack to doom that email to the spam folder. To guard against these threats, one powerful tool is DomainKeys Identified Mail (DKIM) authentication. In this post, we’ll explore what DKIM is, how it… Read more »
Navigating Data Privacy: The Dangers of Tracking Technologies
Kaiser Permanente, a major healthcare provider, recently informed 13.4 million current and former members and patients that tracking technologies may have transmitted personal information to third-party vendors like Google, Microsoft Bing, and X while logged into a Kaiser Permanente account or service. The incident sheds light on an ongoing issue with the privacy risks associated… Read more »
Thread Hijacking Attacks Targeting Email Users
Thread hijacking attacks, a sophisticated form of social engineering, occur when an individual’s email account is compromised, and the attacker sends malicious emails from that account within an ongoing email thread. This method leverages the recipient’s trust in the sender and curiosity to trick them into clicking on malicious links or attachments. In a recent… Read more »
AI Scams on the Rise: LastPass’s Close Call
Details of the Attack In a recent blog post, LastPass revealed the details of an attempted AI driven scam. An employee received multiple WhatsApp communications, including calls, texts, and a voice message, purportedly from the company’s CEO, Karim Toubba. Recognizing the communication as unusual and potentially fraudulent, they promptly reported it to the internal security… Read more »
Major Email Security Risks in 2024
Email remains king as the primary form of communication in the modern workforce. However, its extensive use also makes it a prime target for cyber threats. According to a recent report by Cofense, a staggering 90% of data breaches stem from phishing attacks, establishing it as the leading vector for cybercrime in 2024. Who is… Read more »
New Malware Infiltrating Inboxes
Latrodectus, a recently discovered malware, may be sitting in your inbox. First appearing in phishing campaigns in late November 2023, the malware has raised major concerns in the cybersecurity community because it can bypass protections to execute malicious code to the user. Its infiltration tactics involve deceiving victims with fake legal threats, leading them to… Read more »




