Articles

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

Read More
Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.

Read More
Weaponizing "Contact Us" Forms: Stopping "ZipLine"-Style Phishing At The Front Door

"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.

Read More
Microsoft Teams Social Engineering Scams: Recognizing The Red Flags

Microsoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.

Read More

Latest

ClickFix Malware: How Fake Windows Updates Trick Everyday Users

ClickFix malware campaign is back with a new phase. We explore how scammers use realistic update screens and verification pages to make people install malware.

Read More
From Confidential To Compromised: Closing Trade Secret Vulnerabilities?

A chef is arrested for stealing secret recipes. We comment on how clear definitions, monitoring, and swift enforcement transform trade secrets from informal know-how into protected assets.

Read More
When Managers Are Happy, Are Your Employees Happy? You Make The Call

A survey reveals that when managers are happy, employees are happy. What do you think? You make the call and join the conversation.

Read More
Is Strict Control Of Business Applications Necessary To Protect Data?

A particular nation state bad actor is at it again - this time using business apps to hide malware. We provide the sourced reporting and some solutions.

Read More
Stopping Employee Credit Line Fraud Before It Starts

An employee steals $100K from her employer, in part by opening new lines of credit. We comment on practical steps employers can take to tighten authorization, monitoring, and enforcement to prevent employees from opening credit lines.

Read More