How To’s: Your go-to when in doubt
No more jargons. We break down cybersecurity using plain language. Explore our living library of manuals, useful links, and practical articles that help you become more confident in your security practices.
Learn how to quickly get the hang of ATTACK Simulator
You might have trouble getting started with ATTACK Simulator. Don’t worry, it’s ok, we’re here to help. Find out:
- How to get started
- How to create your first simulation
- How to whitelist
- How to understand reports
Quick guide to 6 common types of phishing
Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud. From phreaking to phishing The term...
Top 3 ataques de phishing del año 2020
Aunque parezca increíble, seguimos cayendo en la trampa de los engaños que emplean suplantación de identidad para robar información, dinero o tomar el control de los sistemas atacados. Los ataques de phishing pueden usar una amplia variedad de aplicaciones móviles,...
$1 million stolen by scammers promoting fake $SpaceX coin “created” by Elon Musk
Lately, YouTube fans have been swindled out of almost $1 million thanks to a convincing fake SpaceX crypto-coin campaign through a popular decentralized finance protocol called Uniswap. Who started the fake SpaceX coins ads? This year in early May, many scammers...
Massive LinkedIn breach: 700M users’ data exposed
After a similar incident in April, in which a jaw-dropping 500 million profiles were put up for sale online, LinkedIn suffers a second massive data breach. Reportedly, the latest incident has exposed the sensitive data of 700 million (92%) of its users. The leaked...
The aftermath of the Colonial Pipeline ransomware attack of May 7th
The aftermath of the ransomware attack carried out by the DarkSide group against Colonial Pipeline, the biggest fuel provider in the US, consisted of major disruptions throughout the US energy sector and served as a lesson in demonstrating the importance of protecting...
Ransomware victim? Here are 8 things to do after the attack
Ransomware attacks have increased recently! "Why can’t I open that document? My computer is just getting slower and slower; I need help!" It all starts with this, and then you get a call from your IT team telling you the words you were hoping not to hear: "We’ve been...
No more “Son, how do I…?” Find your answers here
Computer security can be an intimidating subject. We prepared a few guides to get you started.
- Introduction to Antivirus Solutions
- Introduction to VPNs
- Security when working from home
Quick guide to 6 common types of phishing
Phishing is a cybercrime that uses different tactics, such as deceptive emails, websites and text messages, in order to obtain users ‘personal information. Attackers use the obtained information for identify theft and fraud. From phreaking to phishing The term...
Top 3 ataques de phishing del año 2020
Aunque parezca increíble, seguimos cayendo en la trampa de los engaños que emplean suplantación de identidad para robar información, dinero o tomar el control de los sistemas atacados. Los ataques de phishing pueden usar una amplia variedad de aplicaciones móviles,...
$1 million stolen by scammers promoting fake $SpaceX coin “created” by Elon Musk
Lately, YouTube fans have been swindled out of almost $1 million thanks to a convincing fake SpaceX crypto-coin campaign through a popular decentralized finance protocol called Uniswap. Who started the fake SpaceX coins ads? This year in early May, many scammers...
Massive LinkedIn breach: 700M users’ data exposed
After a similar incident in April, in which a jaw-dropping 500 million profiles were put up for sale online, LinkedIn suffers a second massive data breach. Reportedly, the latest incident has exposed the sensitive data of 700 million (92%) of its users. The leaked...
The aftermath of the Colonial Pipeline ransomware attack of May 7th
The aftermath of the ransomware attack carried out by the DarkSide group against Colonial Pipeline, the biggest fuel provider in the US, consisted of major disruptions throughout the US energy sector and served as a lesson in demonstrating the importance of protecting...
Ransomware victim? Here are 8 things to do after the attack
Ransomware attacks have increased recently! "Why can’t I open that document? My computer is just getting slower and slower; I need help!" It all starts with this, and then you get a call from your IT team telling you the words you were hoping not to hear: "We’ve been...