Blog

  • SCAM OF THE WEEK: Sophisticated Spear Phishing

    .

    SCAM OF THE WEEK: Sophisticated Spear Phishing Last month, researchers at Fortinet observed a sophisticated phishing email sent to a Hungarian diplomat. In the email, cybercriminals disguised themselves by using the first and last name of an employee in the diplomat’s IT department. In this case, the diplomat believed that the email was suspicious and…

  • SCAM OF THE WEEK: Cybercriminals and Credit Unions

    .

      SCAM OF THE WEEK: Cybercriminals and Credit Unions Recently in the United States, the National Credit Union Administration (NCUA) warned of an increase in cyber attacks targeting credit unions. Credit unions are typically small non-profit institutions with very loyal customers, which makes them the perfect target for cybercriminals. In most credit union scams, cybercriminals…

  • SCAM OF THE WEEK: Expect a Surplus of Supply Chain Scams

    .

    SCAM OF THE WEEK: Expect a Surplus of Supply Chain Scams Throughout April, Shanghai and other major cities in China have been on lockdown due to recent COVID-19 outbreaks. Along with the ongoing war in Ukraine, these lockdowns have drastically impacted supply chains for industries around the world.  We expect to see another wave of…

  • SCAM OF THE WEEK: Europol Vishing Scam

    .

    SCAM OF THE WEEK: Europol Vishing Scam Voice phishing, or “vishing”, is a phishing attack conducted by phone. Vishing is a classic tactic that cybercriminals continue to use today. Recently, cybercriminals launched a vishing attack that impersonates Europol, the law enforcement agency of the European Union (EU). Using advanced techniques, cybercriminals disguise their phone numbers…

  • SCAM OF THE WEEK: Watch Out for Apple and Meta EDR Scams

    .

    SCAM OF THE WEEK: Watch Out for Apple and Meta EDR Scams In the United States, law enforcement agencies must obtain a court-ordered warrant or subpoena before requesting user data from a tech company. However, in extreme scenarios, law enforcement agencies can bypass this process by issuing an Emergency Data Request (EDR). Since the request…