Modern email scams are more personal and deadlier

Modern Email Scams are more personal and deadlier

( 3 min read ) When we hear news about this scam or that, we often wonder how someone else could’ve fallen for such an obvious hacking attempt. But in truth, email scams are not that easy to decode or identify. Especially because modern email scams have become more personal, researched, and focused. Hackers are now doing their homework on […]

Continue reading


Optimize your email security architecture to prevent phishing

Reassessing Your Email Security Architecture

( 3 min read ) Over the past several years, early-stage detection and response to email threats have saved multiple organizations from severe disruption. However, being able to see the hints of an email infiltration from a mile away is a luxury that is only afforded to those who have thought through and planned their email security architecture. In this […]

Continue reading


A CrimsonRAT Among Indian Officials

A CrimsonRAT Among Indian Officials

( 2 min read ) Threat actors belonging to the notorious Transparent Tribe group have launched another cyber attack campaign, this time targeting Indian officials. They are using a Windows-based Remote Access Trojan named CrimsonRAT and creating backdoor targets among Indian governmental and military personnel. Cisco Talos researchers are hot on the case. Here is an update they shared: “Transparent […]

Continue reading


US Infrastructure Attacked by AvosLocker Ransomware

( 2 min read ) Higher up authorities in the United States of America, including the FBI and the Treasury Department have recently issued a cybersecurity advisory. The advisory warns organizations in the US to be wary of an oncoming stream of AvosLocker ransomware attacks. It is recognized that the AvosLocker ransomware has been in use to target specific critical […]

Continue reading


The Biggest Internet Scams – And How to Stop Them

The Biggest Internet Scams

( 4 min read ) Phishing is a popular internet scam that has been claiming victims by the millions every year. It is often a precursor to a bigger, more dangerous attack or can even be an end-goal in itself. It is easy for hackers to execute since baiting victims is more a psychological than a technical game. For phishing, […]

Continue reading


New Emotet Campaigns Disrupting Mailboxes

New Emotet Campaigns Disrupting Mailboxes

( 2 min read ) The Emotet malware seems to be back from its 10-month vacation. Mid November, new Emotet campaigns were discovered, along with the distressing news that it has started spreading malicious documents to inboxes across the world. Revisiting the Emotet Malware Basics Cybersecurity professionals globally twitch their muscles when they hear about this infamous and dangerous strain […]

Continue reading