Africa’s Low Ranking On Phishing Resilience, BBC Breach, TikTok Celeb Accounts Compromised!

We are here with a dose of cybersecurity news that will keep you updated with the cybercrimes happening around the globe. You will learn to safeguard yourself against such fraud by seeking inspiration from real-life incidents, such as Africa’s poor ranking in phishing resilience. Also, we will shed light on the BBC breach which has…

The Metamorphosis of Deception: Tracing the History of Phishing Attacks

The Metamorphosis of Deception: Tracing the History of Phishing Attacks

There’s so much talk in the industry about phishing attacks, but do you know how this classic technique of cyber deception came into being and evolved into the malicious force that we know today?  There is no doubt that phishing attacks are one of the most nefarious and sophisticated cybersecurity threats, where the hacker tricks…

A Roundup of the Top Phishing Attacks in 2024 So Far

Is your mailbox flooded with unsolicited emails? While most of these emails are harmless (like bulk or spam), some of them have the potential to seriously damage your entire ecosystem. Year after year, these emails are getting more frequent and formidable. In fact, we are only halfway into 2024, and the number of fraudulent emails…

What is the Role and Relevance of PTR DNS Resource Records?

You might be familiar with DNS records that map domain names to IP addresses. But have you ever come across the term “PTR (Pointer) records” or perhaps “reverse DNS records?” PTR records, or reverse records, as the name suggests, are the exact opposite of “a” DNS records. So, instead of translating domain names to IP…

Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies

Understanding Kimsuky’s Latest Phishing Tactics: Exploiting DMARC “None” Policies

News Flash: The infamous North Korean group of hackers — Kimsuky strikes back! Kimsuky is not a new name in the cybersecurity circle, as it is well known for pulling off sophisticated email-based attacks and leveraging social engineering tactics. But this time, they have changed their approach and shifted their focus towards organizations that have DMARC…

Decoding PCI DSS v4.0 and Enhancing Security with DMARC: A Guide

Does your business involve your customers making card payments? If yes, this one is for you! Now that digital payments have become the backbone of most businesses, you cannot afford to let any unauthorized entity snoop in on your transactions or your customers’ card details. They could use this information to unleash havoc on your…

Fixing Google Calendar Invites That Fail DMARC Checks

Google Calendar invites fail DMARC checks when the recipient replies to them, and the response goes back to Google’s servers instead of the sender’s domain. This happens because the ‘From’ address and the originating server don’t match.  This failure also occurs due to the fact that Google uses shared IP addresses to send Google Calendar…

Decoding the Subtle Art of Deception: Homoglyphing and Its Role in Phishing Attacks

Decoding the Subtle Art of Deception: Homoglyphing and Its Role in Phishing Attacks

Have you ever confused “0” (the digit) for “O” (uppercase alphabet) while entering a password? Or have you stared at your screen trying to differentiate “1” from “l” (lowercase L)? If so, you are not alone! Truth be told, these mix-ups are fairly common and might seem harmless, but that is only until they are…

Beware of Phishing Attempts- Apple Users’ Version!

Beware of Phishing Attempts- Apple Users’ Version!

Lately, Apple users across 92 countries have received the biggest shock of their lives in their email and iPhone inboxes! Apple contacted them regarding a “mercenary spyware attack.”  To make it more ominous, the users would get to see a “Threat notification” if they logged into their Apple ID.  The message emphasized the gravity of…