What is DKIM Authentication?

Posted by - May 14, 2024

Getting your email into a prospect’s inbox is already challenging. The last thing any organization wants is for a phishing or spoofing attack to doom that email to the spam folder. To guard against these threats, one powerful tool is DomainKeys Identified Mail (DKIM) authentication. In this post, we’ll explore what DKIM is, how it… Read more »

Thread Hijacking Attacks Targeting Email Users

Posted by - April 22, 2024

Thread hijacking attacks, a sophisticated form of social engineering, occur when an individual’s email account is compromised, and the attacker sends malicious emails from that account within an ongoing email thread. This method leverages the recipient’s trust in the sender and curiosity to trick them into clicking on malicious links or attachments. In a recent… Read more »

AI Scams on the Rise: LastPass’s Close Call

Posted by - April 18, 2024

Details of the Attack In a recent blog post, LastPass revealed the details of an attempted AI driven scam. An employee received multiple WhatsApp communications, including calls, texts, and a voice message, purportedly from the company’s CEO, Karim Toubba. Recognizing the communication as unusual and potentially fraudulent, they promptly reported it to the internal security… Read more »

Beware of Elaborate Phishing Attacks Targeting Apple Users

Posted by - April 04, 2024

Reports have surfaced detailing a sinister phishing campaign that leverages what appears to be a flaw in Apple’s password reset mechanism. Victims find themselves bombarded with a barrage of system-level prompts, rendering their devices virtually unusable until they respond to each prompt with either an “Allow” or “Don’t Allow.” This inundation tactic, dubbed “push bombing”… Read more »

Hackers Exploit Tax Season to Scam Small Businesses

Posted by - March 29, 2024

For many small business owners, tax season is a time of crunching numbers, gathering documents, and ensuring regulation compliance.  Unfortunately, hackers take advantage of this busy period to take advantage of unsuspecting businesses. The Phishing Net: With tax-related phishing scams, hackers may impersonate the IRS or tax preparation services, luring businesses into providing confidential information…. Read more »

Critical Vulnerabilities Found in WordPress Plugins Put Thousands of Websites at Risk

Posted by - March 20, 2024

Is your organization’s website hosted on WordPress? According to a recent discovery by the Wordfence team, your site may be at risk. The Wordfence team at WordPress security company Defiant have unveiled critical vulnerabilities in two discontinued MiniOrange plugins, as well as another concerning flaw in the widely-used RegistrationMagic plugin. These vulnerabilities pose significant risks… Read more »

Cyberthreats Against Your Company May Start as Low as $40

Posted by - September 23, 2020

As cyberthreats and attacks continue to increase, a recent report by Positive Technologies reveals an analysis that exposes why that is. The report shows the costs of many cybercrime services across the dark web are surprisingly cheap. According to the report, the costs of cybercrime services can begin from as low as $40 to $4,500…. Read more »

How Cybercriminals are Using the Dark Web to Scam People From US Employee Benefits

Posted by - August 24, 2020

Cybercriminals have been capitalizing on every virtual aspect of the coronavirus pandemic. Malware has been created to tap into the medical, financial, social, and even psychological repercussions of the outbreak. In a blog post entitled Pandemic Unemployment Scams Made Easy, IntSigns notes that the dramatic rise in unemployment numbers has placed major stress on the… Read more »

FBI Warns Companies Still Using Windows 7 After End of Life

Posted by - August 11, 2020

The Federal Bureau of Investigation sent a private industry notification on Monday to partners in the US private sector about the dangers of continuing to use Windows 7 after the operating system reached its official end-of-life earlier this year. The notification mentions that cyber criminals are now targeting computer networks after an operating system achieves… Read more »