Blogs
THE LATEST CYBERSECURITY NEWS
Categories
QR Codes Continue To Be a Source of Cybersecurity Risk
QR phishing, or “Quishing” as it’s now called, is the latest of a new type of phishing attack that is proving extremely successful (for criminals)
The Colors of a Penetration Test
We break down the Colors of a Penetration Test for non-IT business leaders in a new blog post. Learn about Blackbox vs. Whitebox, Red Team vs. Blue Team, and more.
QR Code Attacks Are Here and They Are Very Successful!
You may know what a QR code is, but are you aware that there is now a new wave of QR Code cyber-attacks that are extremely successful?
Are You Protecting Yourself and Your Firm Against SIM Swapping?
SIM swapping is the latest in a trend of attacks in which criminal are able to break into your online accounts despite Multi-Factor Authentication (MFA) protections
Hackers’ Use of “MFA Fatigue” Attacks is Growing
Cyber criminals are increasingly focusing – quite successfully – on ‘MFA Fatigue’ attacks, which send relentless MFA push requests to a mobile device while masquerading as the IT department or other trusted entities
ChatGPT Fraud on the Increase
It’s critical that asset and wealth management firms develop strict GenAI Acceptable Usage policies in their employee handbook
If You Are Regulated, You Better Have a Policy Related to Your Company’s Use of AI
If you must use AI systems then at least get your employee handbook updated with an AI use policy
Are You Sure That Your Disaster Recovery Testing Includes All Your Data?
It is critical to ensure that Disaster Recovery Testing includes all data – especially data that is considered to be immutable, like emails
Do You Really Know What A PenTest Is?
While vulnerability scanning is often referred to as a Penetration Test, it is technically not a pentest