tactics
-
Blog
Vishing, Wangiri, and Other VoIP Fraud Tactics On the Rise
VoIP fraud is a serious and growing threat to businesses, with attackers increasingly targeting cloud phone systems to exploit vulnerabilities for financial gain. This type of fraud involves unauthorized access to a VoIP network, often for making costly international calls or redirecting traffic to premium-rate numbers. But there are many types of VoIP fraud, and not all of them rely…
Read More » -
Blog
Midnight Blizzard is on the rampage again, and enterprises should be wary of its new tactics
Microsoft is warning of a Russia-linked spear phishing campaign targeting government, academia, defense and NGOs. The notorious Midnight Blizzard group – also known as APT29 and Cozy Bear – has been carrying out its campaign in dozens of countries. As with its earlier phishing campaigns, it’s been particularly active in the UK, Europe, Australia, and Japan. The campaign is still…
Read More » -
Blog
Phishing tactics: The top attacks trends in 2024
Phishing is one of the simplest attack methods, but it is also among the most effective. Email addresses are easily stolen in cyber attacks, then used to target employees to persuade them to hand over data or download malware. A recent attack on greater Manchester councils is a prime example. It led to thousands of users being sent a phishing…
Read More » -
Blog
The Iran cyber threat: Breaking down attack tactics
The Iran cyber threat often comes last when mentioned alongside the other so-called “CRINK” attackers, China, Russia, and North Korea. But the risk posed by the country is growing fast, evolving from simple website defacement to attacks on critical national infrastructure (CNI) and more recently, significant US election interference. In August, US intelligence officials confirmed that Iran was behind a…
Read More »