Top Unusual Cybersecurity Hacking Strategies
The internet introduced us to the new digital world. Any illusion that the internet would be safe and free from threats was shattered, however, in 1988 with the introduction of the Morris Worm. In the...
View ArticleExposing Targeted Attacks by Observing Privilege Interactions Between Entities
In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were...
View ArticleNeed for Better Employee Protection is Apparent During Cybersecurity...
National Cybersecurity Awareness Month is upon us again, and it’s a great time to be reminded that the top cause of corporate data breaches is phishing. The very nature of phishing is to elicit an...
View ArticleSocial Engineers are No Match for Artificial Intelligence
We are still in the early days of artificial intelligence, but it is quickly becoming an essential part of how organizations defend themselves. Using advanced algorithms, enterprises are improving...
View ArticleEveryone’s Creating Fake Social Media Accounts, Including Homeland Security
Over the last few years, we have all had to accept that social media platforms can and will be used by nefarious actors to achieve their ends. In fact, in many cases, these nefarious actors appear to...
View ArticleShashi Prakash Chats about Cryptocurrency and NFT Fraud
TechSpective Podcast Episode 055 One of the hot trends right now is the NFT. NFT–pronounced by some as “nifty” because it is catchier than saying N-F-T–stands for “non-fungible token”. NFTs exist in a...
View ArticleJayson Street – Hacking and Social Engineering and Why There are No ‘Black...
TechSpective Podcast Episode 063 What is a hacker? This is a question that has been debated for decades in the cybersecurity arena. Media conflated hacker and cybercriminal very early on, and it has...
View ArticleSlashNext Generative HumanAI Proactively Defends against Generative AI Attacks
Business email compromise (BEC) is a sophisticated form of cybercrime that involves the use of email to deceive and defraud businesses. Attackers impersonate a trusted individual or entity, such as a...
View ArticleRansomware and Social Engineering Threats Are Real
With the start of Q4 and Cybersecurity Awareness Month, the last three quarters have witnessed exponential growth in the severity and number of attacks. A report by Malwarebytes in August showed that...
View ArticleThe Imperative Role Parents Play in Ensuring Their Children’s Safety While...
In today’s digital age, our children are growing up in a world that is vastly different from the one we knew as kids. With the internet and video games becoming an integral part of their lives, the...
View ArticleAvoid the Dangerous IRS Phishing Scams During Tax Season
It’s tax season once again, when scammers start working overtime to deceive unwitting taxpayers into giving away personal information or sending in money for phony tax preparation services, or even...
View Article