Resources
In July 2024, KnowBe4 revealed that we had unknowingly hired a North Korean who was pretending to be someone else. We locked down the laptop that was sent to the fake employee within 25 minutes of receiving an alert that he was trying to do something suspicious, and at no time...
Read more
Published on: 09-10-2024
Researchers at Malwarebytes warn of a surge in election-themed scams ahead of November’s presidential election in the US. These attacks can be expected to increase as the election grows closer. ...
Read more
Published on: 09-09-2024
Threat actors are opting for malicious links over attachments in email-based attacks because it gives them a critical advantage that many solutions can’t address. ...
Read more
Published on: 09-09-2024
Analysis of a new phishing attack demonstrates how attackers may take a longer path to reach their malicious goals while staying “under the radar” of security products. ...
Read more
Published on: 09-06-2024
A new attack runs slow and steady, focused on compromising large manufacturing companies using contextual social engineering to trick victims into giving up credentials. ...
Read more
Published on: 09-05-2024
Phishing remains a top initial access vector for threat actors, according to researchers at ReliaQuest. Phishing and other social engineering tactics can bypass security technologies by targeting humans directly. ...
Read more
Published on: 09-05-2024
The availability of deepfake technology has given threat actors a valuable tool for social engineering attacks, according to researchers at BlackBerry. ...
Read more
Published on: 09-04-2024
In cybersecurity, technology often takes center stage. From the latest AI-driven defenses to sophisticated encryption techniques, it's easy to overlook the most crucial element: the human factor. ...
Read more
Published on: 09-04-2024
A social engineering campaign is targeting entities in the Middle East using malware that impersonates Palo Alto Networks’ GlobalProtect VPN, according to researchers at Trend Micro. ...
Read more
Published on: 09-03-2024
Researchers at Palo Alto Networks’ Unit 42 are tracking dozens of scam campaigns that are using deepfake videos to impersonate CEOs, news anchors, and high-profile government officials. ...
Read more
Published on: 09-03-2024
Check out the August updates in Compliance Plus so you can stay on top of featured compliance training content. ...
Read more
Published on: 09-03-2024
In a new low for cybercriminals, a new scam attempts to take advantage of those grieving the loss of a loved one, and charges their credit card exorbitant fees. ...
Read more
Published on: 08-30-2024
New data exposes the reality of ransomware attacks today, including their frequency, impact, ransom payment – and the involvement of human error. ...
Read more
Published on: 08-30-2024
QR code phishing has become one of the most rapidly growing forms of phishing, especially since QR codes gained popularity during the global pandemic. Recently, INKY has observed a new evolution of this tactic, where QR codes are constructed using HTML tables and ASCII characters. We've noticed this technique emerging...
Read more
Published on: 08-29-2024
It’s no secret that as a Managed Service Provider (MSP) you’re at the forefront of integrating and managing artificial intelligence (AI) solutions for your clients. While AI offers an array of benefits, from enhancing operational efficiency to proactive security measures, not every organization has the knowledge and understanding necessary to...
Read more
Published on: 08-20-2024
If you’ve ever bought a raffle ticket, purchased a lottery ticket, or called into a radio station for concert tickets, you’ve pictured yourself on the winning side of a prize. It’s a nice feeling. Whether you chalk it up to serotonin, dopamine, or human nature, winning makes us feel good....
Read more
Published on: 07-25-2024
Millions of companies worldwide are reeling from the major cyber outage caused by a faulty system update released by the cloud-based cybersecurity firm CrowdStrike. Slated by some as causing ‘global chaos’, the outage has impacted hospitals, police stations, airlines, banks, stock exchanges, consumers, and more.1 ...
Read more
Published on: 07-19-2024
In today's digital landscape, email remains a primary target for cybercriminals. Phishing attacks, sophisticated forgeries, and malicious content are constantly evolving, and with language processing tools like ChatGPT, phishers can compose high-quality phishing emails, write code, and create sophisticated malware with minimal effort. It’s a disturbing sign of the times,...
Read more
Published on: 07-12-2024
As a Managed Service Provider (MSP) every client you have counts on you to keep their networks and IT infrastructure up and running, around the clock. It’s not an easy calling and with the current state of cybersecurity, a lot of things could potentially keep you up at night. For...
Read more
Published on: 07-09-2024
The world is gradually learning what INKY and Managed Service Providers (MSPs) have known for some time: Artificial intelligence (AI) is a powerful tool that can be used to improve cybersecurity. ...
Read more
Published on: 05-31-2024
Like any enterprise, there are costs associated with doing business. In the world of cybercrime, threat actors have plenty of options. ...
Read more
Published on: 05-23-2024
The 2024 FBI Internet Crime Report has revealed some frightening new trends and statistics that should have every business pausing to consider the state of their organization’s email security. Losses due to cybercrime have reached an all-time high of $12.5 billion, up 21.4% from the prior year.1 And, as predicted,...
Read more
Published on: 05-09-2024
There are not a lot of email security platforms that can detect a phish hiding behind a Rich Text Format (RTF) attachment file. However, that’s exactly what was caught in a new phishing scam that took a very personalized approach to harvesting Microsoft credentials. With multiple versions at play, it’s...
Read more
Published on: 04-30-2024
There is a lot of talk about vendor consolidation these days, and with good reason. When it comes to email security, the more vendors your customers have, the greater their risk. ...
Read more
Published on: 04-12-2024
Phishing threats continue to be the most frequently used form of cybercrime, accounting for 34% of all complaints received by the FBI’s Internet Crime Complaint Center (IC3).1 This means costly trouble for individuals and businesses alike. For those wondering how phishing maintains its top position each year, the most obvious...
Read more
Published on: 04-04-2024
Looking for the tell-tale signs of a phishing email is something many of us have come to do automatically. However, things get much trickier when the phishing emails come in the form of legitimate Adobe notifications, have been authenticated (SPF & DMARC) by adobe[.]com, and use actual Constant Contact tools...
Read more
Published on: 03-12-2024
The State of Email Security If there is one thing about email security and phishing that you can count on, it’s cybercrime’s consistent upward climb. Year after year, phishers are improving their skills - devising more complicated phishing threats, designed to slip by Secure Email Gateways (SEGs) and fool recipients....
Read more
Published on: 02-20-2024
Page Visitors