ATTACK Simulator Security Awareness Blog

Keep your finger on the pulse of cybersecurity.

We’re dedicated to give you the insights you need to mature the security infrastructure in your company. Read from experts in the field and guest authors about the latest news in security awareness, and gain the necessary knowledge about managing risks, and the latest technologies in hacking, including social engineering, phishing, and malware.

Latest Articles

Identity Theft: The 10 Most Common Methods Attackers Use

Identity Theft: The 10 Most Common Methods Attackers Use

Have you ever woken up to accounts you've never created, credit you've never applied for? Not to worry, you most likely didn't travel to a parallel universe while you were sleeping. Instead, you've only become a victim of identity theft. Identity theft is virtually...

read more
Adware 101: Definition, Types, And Infection

Adware 101: Definition, Types, And Infection

Have you ever gotten frustrated with all those annoying invasive ads, such as ridiculously large banners, distracting you from an interesting read or an important purchase? Yeah, we did too. This is why this article will walk you through the essential aspects...

read more
Adware Infections: Signs, Removal, And 9 Prevention Tips

Adware Infections: Signs, Removal, And 9 Prevention Tips

Adware infections have a set of unmistakable symptoms, which we will walk you through in this article. So keep reading to learn how to spot, remove, and prevent adware infections. Signs Of Adware Infections Keep an eye out for the following symptoms if you suspect you...

read more
Top 4 Tricks Used In CEO Fraud Attacks

Top 4 Tricks Used In CEO Fraud Attacks

Scammers are getting more creative with their strategies by the day when it comes to CEO fraud attacks. This article will walk you through the sneakiest and most popular tricks in a hacker's arsenal. What Is CEO Fraud And How Do CEO Fraud Attacks Work? CEO fraud...

read more
Spyware 101: Definition, Types, and Prevention

Spyware 101: Definition, Types, and Prevention

Attackers use spyware to snoop around, secretly collect information and monitor someone's activity against their knowledge and without their consent. Keep reading to learn what this creepy and invasive form of malware is, the types and cautions you can take against...

read more