• KEEP YOUR INSTITUTION SAFE WITH A PHISHING SIMULATION SOFTWARE!
    Genel

    Keep Your Institution Safe with A Phishing Simulation Software!

    1- What is A Phishing Simulation? A Phishing simulation is a solution that trains individuals against cyber attacks that may come through email and helps individuals to be one step ahead of attacks. The simulation literally means “imitation, similar”,  which models a theoretical or physical system in a computer environment and conducts experiments in order to understand…

  • Watering Hole Attacks
    Genel

    WATERING HOLE ATTACKS

    “What are watering hole attacks” and “how to mitigate them” have been some of the most frequently asked questions people are looking to find answers to today. In this article, we will cover the definition of watering hole attacks, provide some real examples, and conclude with measures that can be taken to avoid falling victim…

  • NEW CHINESE MALWARE – TAIDOOR
    Genel

    NEW CHINESE MALWARE – TAIDOOR

    US government agencies say Taidoor malware has been around since 2008 and is a remote access Trojan (RAT) type of malware. 1. What is a RAT? (Remote Access Trojan)  It is a type of malware that causes hackers to have remote access to the device of the target user and to take control of the device. …

  • baiting
    Genel

    BAITING

    In this blog, we are going to discuss Baiting which is a common method of a Social Engineering attack the others include phishing, pretexting, watering holes, quid pro quo and tailgating. 1. What is Baiting? Baiting is Phishing’s devious cousin. As the name suggests, Baiting involves luring an unsuspecting victim with a highly attractive offer playing on fear, greed and temptation …

  • MALWARE ATTACKS HAVE INCREASED 8 TIMES IN THE LAST 10 YEARS
    Genel

    MALWARE ATTACKS HAVE INCREASED 8 TIMES IN THE LAST 10 YEARS

    Malware attacks have increased 8 times in the last 10 years. Applications and devices must have machine IDs to securely communicate with each other upon authentication. However, whether it is a Kubernetes application or a serverless function in the cloud, machines prefer to use encryption keys and digital certificates used as machine IDs rather than relying…

  • RANSOMWARE ATTACK SHUT DOWN SCHOOL SYSTEM
    Genel

    RANSOMWARE ATTACK SHUT DOWN SCHOOL SYSTEM

    Ransomware Attack Shut Down School System. On the first day of elementary school students starting online classes, the Haywood school system was hit by a ransomware attack. 1. How Ransomware Attack Shut Down School System? The attackers demanded a large amount of money to restore the system, but the ransom amount was not unveiled by school authorities.  Related IT teams…

  • WHALING
    Genel

    WHALING

    In this blog, we are going to discuss  the  Whaling attack that evolved in the last couple of years targeting someone like a top-level executive like a senior executive at a corporation. Whaling attacks have seen a sharp rise and are expected to go up, as according to the FBI that these attacks resulted in losses of more…

  • How Did Tesla Ransomware Attack Happen?
    Genel

    HOW DID TESLA RANSOMWARE ATTACK HAPPEN?

    A serious ransomware attack targeted Tesla. Tesla CEO Elon Musk explained in a Tweet that a 27-year-old Russian citizen was trying to persuade an insider and offered him a million-dollar payment in exchange for installing a ransomware into the system and helping to trigger it. Prosecutors did not name the person arrested. According to the billionaire, criminal’s plan…

  • NEW OUTLOOK THEMED PHISHING ATTACK ON BANKING SECTOR
    Genel

    NEW OUTLOOK THEMED PHISHING ATTACK ON BANKING SECTOR

    New Outlook Themed Phishing Attack on Banking Sector In this article, we are going to provide some information about the new outlook phishing attack targeting some employees working in the banking sector from Keepnet customers. 1-What is the new outlook phishing attack? How does it work? Recently the attackers have planned to penetrate companies by…

  • THE SERVICES THAT WERE USED FOR RANSOMWARE INFECTION?
    Genel

    THE SERVICES THAT WERE USED FOR RANSOMWARE INFECTION?

    The Services That Were Used For Ransomware Infection? Ransomware Infection – While ransomware generating hackers are heavily targeting vulnerabilities in Citrix and Pulse Secure VPN software to infiltrate corporate networks in the first half of 2020, some ransomware targets the vulnerable or risky Windows Remote Desktop Protocol (RDP). Ransomware attacks targeting the business sector reached…

RSS Teknoloji Haberleri