Uncategorized

English speakers are being sought by con artists for BEC

Business email campaigns schemes, like ransomware, can be simple to implement but have the potential to be extremely damaging to a company.

A BEC scam typically begins with a phishing email that is tailored and customized to the victim. To trick an employee into making a payment to an account controlled by a criminal, social engineering and email address spoofing can be used to make the message appear to come from someone in the target company — such as an executive, the CEO, or a member of the accounts team.

(more…)
read more

Is NDR Traffic Mirroring Worth the Effort?

Network Detection & Response (NDR) is a new security technology that aims to fill the gaps left by traditional security solutions, which hackers use to gain access to target networks.

(more…)
read more