ATTACK Simulator Security Awareness Blog
Keep your finger on the pulse of cybersecurity.
We’re dedicated to give you the insights you need to mature the security infrastructure in your company. Read from experts in the field and guest authors about the latest news in security awareness, and gain the necessary knowledge about managing risks, and the latest technologies in hacking, including social engineering, phishing, and malware.
Latest Articles
Spoofing: 2 Most Common Types & How They’re Used In Phishing Attacks
Phishing is quite a serious issue in today's heavily digitalized world. Spoofing is often the way attacks happen. Let's take a closer look at the most common spoofing techniques in a phisher's arsenal. Phishing And Spoofing Go Hand In Hand By definition, a phishing...
Top 5 Phishing Tricks Your Employees Should Watch Out For
Phishing has become a very lucrative business, and scammers can get very creative with the phishing tricks that they use. This article will walk you through the five most common tactics cybercrooks use to convince you to hand over your precious sensitive data....
Business Email Compromise 101: Definition, Techniques, Types, And Precautions Against It
Business email compromise (BEC) is a form of phishing in which the attacker impersonates someone on a corporate network to trick the target into sending money to the attacker’s account. BEC scammers usually pick on companies that use wire transfers to pay...
BEC: 10 Famous Cases To Learn From
BEC (Business Email Compromise) attacks pose a significant threat to both companies and governments. This particular form of phishing has been ravaging organizations for years now, causing damages worth billions of dollars. Let’s take a look at ten famous cases that...
Ransomware Attacks: Knowing Your Company’s Weaknesses Is Key To Stopping Them
Ransomware attacks happen all the time, and your business could become the next target. A company that can't objectively assess its own security flaws makes for a perfect potential victim. Knowing your network's vulnerabilities can help you stop such attacks. This...
7 More Phishing Strategies That May Be Targeting Your Company Right Now & How To Identify Them
With all the cyber dangers lurking in the dark corners of the Internet, it’s time you discover another seven common phishing strategies that may be threatening your company as you read this. Phishing is the root cause of devastating ransomware attacks, data theft, and...
Cybersecurity Awareness Month: 12 Tips To Help You And Your Company Dodge The Phishing Hook
It’s beginning to look a lot like... Cybersecurity Awareness Month. So, what better time to improve your hook-dodging ability, especially with phishing becoming a hacker’s favorite leisure activity? Keep reading to discover twelve tips that will help you keep scammers...
7 Types Of Phishing Attacks & How To Spot Them
Tale as old as time, phishing as old as the Internet itself. Cybercriminals launched the first phishing attacks as early as the 90s, stealing passwords and financial information. Since then, malicious operations that plague both individuals and companies have ramified...
The Ransomware as a Service Threat: How Bad Is It And 5 Tips To Protect Your Company From It
Ransomware is an ever-growing threat, and Ransomware as a Service plays a big part in its supremacy. But what is it exactly, and what can you do to defend yourself or your company? In this article, we’ll walk you through a complete guide on what Ransomware as a...
Top 5 Most Devastating Phishing Attacks Of All Time
You might think you’ll dodge the hook. What are the odds of a phisher picking on your company, right? But, with such devastating phishing attacks hitting massive organizations, can you really afford to take the risk of relying on luck? Let’s take a look at the five...