Malicious Use of QR Codes on the Rise Through Quishing Attacks
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The…
Quick Response codes – aka QR Codes – were first used in 1994 by a Japanese company called Denso Wave to primarily track parts in the automotive manufacturing process. The…
Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to…
A new warning from Verizon about the rise of smishing, spam text messages and text scams and the FBI reporting $10.3 billion in internet fraud last year, CISOs are increasingly…
Deepfake social engineering scams have become an increasingly scary trend among cybercriminals to socially engineer victims into submission. The threat actors are using Artificial Intelligence (AI) and Machine Learning (ML)…
The rising trend of employees using personal devices for work has cybercriminals directing focus towards mobile devices for launching attacks. The lack of security protection and accessibility of sensitive information…
With 83% of organizations reporting mobile device threats are growing more quickly than other device threats, according to a Verizon MIS report. Hackers are turning attention to mobile devices using…
There are many compelling reasons why tax returns are valuable to hackers, but all are related to monetary gain. Tax returns are dense with personal information, including social security numbers,…
Human hacking is a modern way to think about phishing in its entirety, which is anything malicious that reaches a user to steal credentials, data, or financial information. By focusing…
With the rise of 270% rise in social engineering in 2021, humans are the most vulnerable cybersecurity entry points into an organization. By moving completely to the cloud, apps and…
Earlier this year, SlashNext debuted “Phish Stories,” a videocast and podcast series during which cybersecurity experts discuss new zero-hour phishing attacks before a live audience of CISOs, CSOs and cybersecurity professionals. In…