Phishing scams are the most common origin of data breaches. A more targeted and dangerous version of phishing is spear-phishing. Unlike generic phishing, which casts a wide net, spear-phishing targets specific individuals by using personal details to make scam messages more believable. With the advent of AI, these attacks have become even more efficient and […]
Hackers Love Credential Stuffing – Stop Reusing Passwords!
Credential stuffing may sound dirty, but it’s the dirty little secret of hackers. If you’ve ever used the same password for more than one account, then you’re not alone. Unfortunately, more than 80% of account breaches originate from weak and repeated passwords. Hackers count on that reuse and exploit it using credential stuffing. Every year, […]
Payment Re-Direct Scams: Don’t Be the Next Victim
You’ve seen numerous articles warning you about the dangers of Business Email Compromise (BEC), but have you heard of payment re-direct scams? You know your small organization is in the crosshairs of cyber criminals because, unlike big municipalities and businesses, you don’t have the staff or the resources to focus on cyber security around the […]