Understanding threat actors

Understanding Threat Actors

A threat actor or “malicious actor” is defined as either a person or a group of people that take part […] ...
Defending Against Vishing: Is It Really Possible?

Defending Against Vishing: Is It Really Possible?

Vishing, a word that was entered into the Oxford Dictionary in 2015, defines what we call “voice phishing”. Using the […] ...
The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

The FBI Told Me: Analyzing the FBI’s Cyber Crime Report

When you are a vendor who provides a valuable service, you look for opportunities to help companies. Sometimes, a vendor’s […] ...
See Yourself In Cyber

See Yourself in Cyber

When you read this title maybe you think of yourself “I know nothing about computers.” Or, perhaps you think, “I’m […] ...
Vishing (Voice Phishing) in Social Engineering News

Vishing (Voice Phishing) in Social Engineering News

A new report by Mutare reveals costly and pervasive shortcomings in enterprise security protections against voice network attacks, such as […] ...
What is Vishing and Is It A Threat to Your Business?

What is Vishing and Is It A Threat to Your Business?

Vishing attacks can take many forms, but the hallmark of vishing is unsolicited telephone calls to your employees. Usually, these phone calls pretend to be from a legitimate organization that your company ...
The Deadly Risk of Cyber Attacks on Hospitals

The Deadly Risk of Cyber Attacks on Hospitals

During a routine visit to the doctor, he asked what I did for a living. I explained that my work […] ...
Stronger Security Posture

Stronger Security Posture: Building Your Program

In the first part of this two-part blog series, we touched on understanding your security posture, training your employees, and […] ...
My First Three Years in the Social Engineering World

My First Three Years in the Social Engineering World

As I enter my fourth year in the social engineering world, I have been reflecting on what I’ve learned so […] ...
Stronger Security Posture

Stronger Security Posture: Where to Start

We talk about information security and its importance all the time. The multitude of attacks in 2022 alone demonstrates its […] ...