Articles

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

Read More
Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.

Read More
Weaponizing "Contact Us" Forms: Stopping "ZipLine"-Style Phishing At The Front Door

"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.

Read More
Microsoft Teams Social Engineering Scams: Recognizing The Red Flags

Microsoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.

Read More

Latest

Does AI Help Or Hinder? You Make The Call

A survey shows AI allows more work to be done but a lot of work is fixing AI mistakes. What do you think?

Read More
ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

Read More
From Confidential To Compromised: Closing Trade Secret Vulnerabilities?

A chef is arrested for stealing secret recipes. We comment on how clear definitions, monitoring, and swift enforcement transform trade secrets from informal know-how into protected assets.

Read More
When Managers Are Happy, Are Your Employees Happy? You Make The Call

A survey reveals that when managers are happy, employees are happy. What do you think? You make the call and join the conversation.

Read More
Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.

Read More