

Domain Doppelgängers: Identifying and Protecting Against Domain Spoofing
Cybersecurity threats continue to...







Ransomware Definition: What is it & How to Secure your Data?
Ransomware is one of the most prominent...



HIPAA (Health Insurance Portability and Accountability Act) Compliance
HIPAA compliance is essential for any...




CCPA (California Consumer Privacy Act) Compliance: Complete 2024 Guide
The California Consumer Privacy Act...








Pretexting Definition: The Art of Deceptive Information Gathering
Pretexting is a social engineering...







Social Engineering Definition: Cybersecurity Best Practices
Social engineering is a technique used...





PII (Personal Identifiable Information): How to Protect Your Privacy?
In today’s digital age, Personal...





Alternatives to GoPhish for Comprehensive Phishing Simulations
Phishing simulation tools have become...






What is phishing? Cyberattack's most popular initial access vector
Whether it's clicking on a malicious...

What are the results to observe during a phishing simulation?
During a phishing simulation, you will...


Click campaigns: lightweight phishing simulations to train people
Click campaigns are now available on...


Defeating Multi-factor Authentication through a Simple Phishing Email
In this article, I will show you in a...

Solutions against ransomware: how to protect, prevent and fight them
Ransomwares are becoming increasingly...

What is Cryptolocker? Presentation, infection and defence strategies
Cryptolocker is a notorious type of...


Emotet: the malware that disrupted the private sector for 7 years.
Originally, Emotet was a banking Trojan...



What is Smishing? Definition, mechanisms, identifcation and examples
Did you know that SMS has an average...






Why carry out phishing simulations with groups of employees?
The aim of your phishing campaigns is...