Bringing up 5 theories that would explain why English language and hackers have a beef.
Category Archives: Blog
Weaponized Pandemic: Actions Criminals Take in Tragic Times
Nothing is sacred for cybercriminals, especially in times of mass confusion, hardship, and angst. Learn how criminals leverage email to accomplish their goals.
Let’s Encrypt CAA Rechecking Bug Affected 3 Million Certificates
Let’s Encrypt discovered a bug in itss certificate authority authorization software, prompting subscribers to react.
BEC Takes $388,700 From “Shark Tank” Star Barbara Corcoran
In a classic case of Business Email Compromise (BEC), Barbara Corcoran loses close to $400,000. The scam came through because of a spoofed email address.
Amazon Phishing Email Attack Botched By The Hackers
Phishing email coming from Amazon is not a surprising story, but the latest Sophos blog post describes a bizarre situation, where hackers failed in fashion.
Confrontation Based On Deception: $3.1 Million Swindled During Negotiations Over John Constable Painting
A classic example of Business Email Compromise recently put a wedge between art dealer Simon C. Dickinson Limited and Rijksmuseum Twenthe.
Global Economy Risks 2020: What Are We Sleeping On?
The World Economic Forum in Davos takes place this week, and while most of us won’t participate, we can and should discuss the information unveiled in the “The Global Risks Report Survey 2020”.
Let’s “Break and Inspect” NSA’s TLSI Advisory
TLSI is essentially a risky trade-off, where you get slightly more insight into what’s leaving and entering your network under the impression that it will protect you from critical data loss or compromise.
My Role In The Cyber Resilience Forum 2019
The 7th edition of Moldova CyberWeek starts today, and that marks the beginning of the Regional Cyber Resilience Forum held in Chișinău.
This Is Why You Have To Protect All Users And Not Only Your Top Level Management
It was a summer to forget for Exim – it disclosed a second critical vulnerability in just three months.