Blog

Coronavirus Homeworkers: ideal prey for hackers

In this time of crisis, everyone is advised to work from home as much as possible, which brings with it the necessary problems… Hackers are lurking to take advantage of security problems and stiff web applications. Meanwhile, Telco’s indicate an explosive increase in the number of homeworkers. Here are our…

Read More

Using a Corona Phishing template?

  Hackers abuse the topicality of the coronavirus for their phishing emails. Do you have to do that as a business during your phishing exercise? Can you use a corona phishing template now? This question has been asked a lot the last few days. Supporters and opponents of a corona…

Read More

Phishing in this new Corona Age

  Now that we all work from home and use email and WhatsApp more often, the number of Phishing messages circulating has increased significantly. From malicious emails posing as an official agency or well-known company to links to phishing websites forwarded via messaging, it’s very watchful in this new Corona…

Read More

What is CEO fraud?

  CEO fraud is a phenomenon that has been circulating for a number of years at large institutions, but now also affects small companies and associations. With CEO fraud, a cybercriminal assumes the identity of the CEO in order to make payment requests to the executive secretary, the CFO or…

Read More

Difference between Ethical Hacking and Penetration Testing

Ethical hacking and penetration testing are two different things, but the terms are often used interchangeably. Although these terms are very different, they enable companies to improve their cybersecurity and reduce the likelihood of a cyber attack. Carefully choosing the right testing methods is essential for companies to protect themselves…

Read More

What is Phishing?

  Phishing is a common online scam where cybercriminals attempt to gain access to sensitive information such as usernames, passwords, and credit card numbers by posing as a legitimate entity. It’s important to remember that phishing scams can take many forms, so it’s essential for all online users to be…

Read More