Articles by Tag #phishing

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Get Phished by a Public AWS Systems Manager Automation Document

[Update 2025-01-09] Thanks Wiz.io for featuring this as a new phishing technique! ...

Learn More 11 0Dec 22 '24

Phishing And Malware - A Practical Dive

"It’s not what happens to you, but how you respond that matters". - Epictetus Picture this: you’re...

Learn More 5 0Dec 2 '24

Creating a Cybersecurity Culture in Small Businesses

*That Time Brenda from HR Nearly Emailed Our Payroll Info to a Nigerian Prince * We Were a...

Learn More 3 1Jun 3

🛑 Don’t Scan That Code: The Rise of QR Code Phishing Scams

“Everything looks safe… until it isn’t. The probable scam might be hiding in plain sight —...

Learn More 3 0Jul 16

🚨 “Google Alert: Someone Just Logged In?” — Don’t Fall for the Phishing Trap

title: "How a Fake Email Can Fool Anyone — And How You Can Stay One Step Ahead" 🛡️ "Cybersecurity...

Learn More 2 0Jul 9

DKIM, DMARC und SPF: Der Schutzschild deiner E-Mail-Kommunikation 🛡️

Schütze deine E-Mail-Kommunikation! Erfahre, wie DKIM, DMARC und SPF vor Spoofing und Phishing...

Learn More 2 0Sep 21 '24

How to Protect Yourself From Malicious Links: A Complete Guide

Always verify links before clicking Introduction In today's digital world, malicious...

Learn More 2 0Jul 27

What is Phishing-Resistant MFA?

Phishing-resistant MFA offers stronger protection by using advanced tools like FIDO2/WebAuthn or...

Learn More 1 0May 14

Cybersecurity Awareness Month: Stay Safe Online

October is National Cybersecurity Awareness Month, that one month of the year where people and...

Learn More 1 2Oct 4 '24

How AI Is Changing the Game in Phishing Attacks

By Dr. Feliks Kravets A Dark Turn in Cyber Deception Phishing attacks have become more...

Learn More 1 0Aug 13

Sennovate’s DLP-as-a-Service: Defending Against Credential Phishing Attacks

Cyber threats are evolving much faster than ever, whereas attackers continuously find new ways to...

Learn More 1 0Sep 24 '24

DKIM, DMARC and SPF: The protective shield for your email communication 🛡️

Protect your email communication! Find out how DKIM, DMARC and SPF protect against spoofing and...

Learn More 1 0Sep 21 '24

Phishing Training for End Users

Businesses are among the main targets of cyberattacks, yet not all companies provide phishing-related...

Learn More 1 0Aug 13

Social Engineering and Human-Centric Security Attacks

# Social Engineering and Human-Centric Security Attacks ## Introduction Social engineering remains one of the most effective attack vectors, exploit...

Learn More 1 0Aug 11

Meow Ransomware: When Cats Aren’t as Cute as They Seem

Created by @hacknip If you thought cats were the rulers of the Internet, wait until you meet Meow,...

Learn More 1 0Dec 5 '24

Exploring Sneakphish: The Ultimate Tool for Social Media Phi$hing

Are you curious about hacking and want a tool that makes it easy to experiment? Let me introduce you...

Learn More 0 0Apr 22

9 Hacker T-Shirts Only Cybersecurity Pros Will Understand (And Laugh At)

If you've ever said "that's a phishing link" in real life... If you log off your terminal just to...

Learn More 0 0Jun 19

Understanding Spear Phishing: How to Protect Yourself from Targeted Cyber Attacks

Spear phishing is a highly targeted form of cyber attack designed to deceive individuals into...

Learn More 0 0Apr 28

A Guide to Phishing Websites and Malicious Link Checkers

1. What Are Phishing Websites? Phishing websites impersonate legitimate platforms—like...

Learn More 0 0Jun 14

Understanding Phishing Attacks: How to Recognize, Avoid, and Respond to Phishing Scams

Phishing attacks are a type of cybercrime where attackers trick individuals into revealing sensitive...

Learn More 0 0Apr 29

AI-Powered Phishing Attacks: Can AI Fool Even Cybersecurity Experts?

Cyber threats are evolving fast, and artificial intelligence (AI) is now playing a major role in...

Learn More 0 0May 6

How to Install and Use AnonPhisher in Termux

Phishing is a common online threat where attackers pretend to be real websites to trick people into...

Learn More 0 0Apr 17

How to Safeguard Your Crypto: Expert Tips for Avoiding Scams and Phishing Attacks

In today’s financial landscape, digital assets are playing an increasingly significant role, offering...

Learn More 0 0Oct 28 '24

Is it possible to eliminate phishing?

Phishing attacks have become an increasingly prevalent and sophisticated threat in the...

Learn More 0 0Sep 25 '24

MrPhish: A Powerful Phishing Tool for Ethical Hackers

MrPhish is a Bash-based script designed for phishing social media accounts using port forwarding and...

Learn More 0 0Apr 23

How to protect yourself against cyber threats

Cybersecurity has become an essential part of our daily lives, especially with the rise of online...

Learn More 0 0Feb 8

How to Install and Use Zphisher in Termux: a Complete Guide

Hello everyone! Last week, I shared a tutorial on Weeman, a phishing tool in Termux. Weeman sometimes...

Learn More 0 0Apr 21

🔍 Protect Your Brand from Online Threats!

Your brand’s online reputation is everything! 🌎🚀 Don’t let cybercriminals hijack your identity. With...

Learn More 0 0Feb 11

What Is Phishing? Real-Life Examples and Protection Tips

Phishing is one of the oldest tricks in the hacker’s book, but it still works like a charm. Why?...

Learn More 0 0Jun 1

How to Prevent Phishing Attacks: A Technical Implementation Guide

Last week, our CISO got phished. Yes, really. The email was so convincing that three senior managers...

Learn More 0 0Jun 20