As a former black hat hacker, social engineering and phishing concepts are not new to me. I have used these techniques in my previous life, so I know their effectiveness. Having spent years immersed in the intricacies of social engineering, I’m always looking for new twists on this age-old technique.
Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! I’m always fascinated by these low level side channel attacks. Though of course, if you are affected by them, then perhaps not so fascinating.
Small businesses may think they don’t need to implement cybersecurity training programs because larger enterprises with more revenue are more profitable for bad actors. However, small businesses lacking essential security measures are prime targets due to the ease of access and fewer resources for investigation and remediation.
We’re excited to share new updates and enhancements for January, including: For more information on these updates and others, please read the complete list below and follow the links for more detailed articles.
Sending large video files with others can be more complex than you anticipated. We often encounter problems because of file size limits, reduced quality, or privacy concerns. To help you solve these issues, we will offer you advice on how to send large video files securely, methods to compress files to bypass size restrictions, and a file-sharing solution that is the best way to send video files without worrying about your privacy.
Did you know that simple possession of your cell phone number could lead to lots of troubles? Phone scams are a means to an illegal end for hackers who are growing in numbers. Being careless with your cell phone number can lead to problems such as getting trapped in a phishing scams net and account access by someone who is not welcome. As per the Federal Trade Commission (FTC) there were more than 2.4 million phone frauds in 2023. Therefore, it is very important to protect your phone number.
Email communication security is essential in a time when cybersecurity threats are on the rise. Email is the most widely utilized medium for business communication, making it an ideal target for hackers. A strong way to safeguard your private information and guarantee safe communication throughout your company is using Office 365 Email Encryption. You may protect your content and show that you are committed to data privacy and regulatory compliance by encrypting your emails.
Cyjax operates within the dark web and ‘hidden service’ spaces to ensure a rich and current intelligence picture for its clients, enabling them to understand the changing threat landscape and prepare for incoming attacks and mitigate existing ones. Predicting an attack can be difficult, but fun!
Managing risk is not an isolated process; it involves a series of coordinated efforts, sometimes spanning across teams, to identify threats, mitigate vulnerabilities, and ensure the organization remains resilient.