Scams Starting on Social Media and Targeting Your Business

Social media is no stranger to scams. However, recent trends show scammers have started to show more aggression toward businesses since the beginning of the pandemic. Being able to recognize these scams ...
Leading Indicators Foreshadow COVID-19 Vaccine Scams

Leading Indicators Foreshadow COVID-19 Vaccine Scams

| | covid, Phishing, Scams, typosquat
Scammers are readying themselves to profit from fear, uncertainty and the misfortune of others ...
Holiday Shopping Scams and Tips to Stay Safe

Holiday Shopping Scams and Tips to Stay Safe

In our November monthly episode we discuss the scams that you may encounter this holiday shopping season due to the pandemic and our top tips on how to stay safe and more ...

Detecting Phishing Emails

Research paper: Rick Wash, “How Experts Detect Phishing Scam Emails“: Abstract: Phishing scam emails are emails that pretend to be something they are not in order to get the recipient of the ...

Protect Your Employees from Business Email Compromise Attacks

Menlo Imposter Threat Detection Flags Payloadless Attacks that Impersonate Senior Executives and Other VIPs Cyberattacks aren’t always delivered via a payload such as a link to a malicious URL or an infected ...

Deepfake Voice Technology Iterates on Old Phishing Strategies

As the world of AI and deepfake technology grows more complex, the risk that deepfakes pose to firms and individuals grows increasingly potent. This growing sophistication of the latest software and algorithms ...
85% of all YouTube Channels Removed in Q1 Flagged Over Malicious or Fraudulent Content

85% of all YouTube Channels Removed in Q1 Flagged Over Malicious or Fraudulent Content

YouTube removed nearly 2 million channels in the first quarter of 2020, 85% of which were terminated due to the promotion of scams, misinformation, and, in some cases, for spreading malware. A ...

On the Twitter Hack

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system ...
emergencies and cyberattacks

Emergencies and Cyberattacks: 3 Common Scams

 Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is ...
Security Boulevard