Email Security 12 May 2022 RLO Technique: How Hackers Are Using a 20-year-Old Text Trick to Attack Microsoft 365 Users While Right-to-Left Override (RLO) attack is an old technique to trick users into executing a… Read More
Security Awareness Cyber Attack Wave to Fear: Vulnerability of Two-Factor Authentication (Part 1/2) Read More
Security Awareness 09 May 2022 Hacker Impersonates TrustWallet in Crypto Phishing Scam On June 12, a wave of more than 50,000 phishing emails sent from a malicious… Read More
Security Awareness 08 May 2022 Instagram Phishing Campaign: Hackers Exploit Social Verification A new Instagram phishing campaign has surfaced recently. First discovered in late July, the scam exploits… Read More
Security Awareness 28 April 2022 Anti-Phishing Banner: Sufficient Warning of External Emails or Further Danger? Read More
Threat Reports 25 April 2022 Email Threat Review March 2022 In this installment of our monthly email threat review, we present an overview of the… Read More
Press Releases 20 April 2022 Hornetsecurity’s global expansion continues with two new backup data storage regions Hornetsecurity expands backup data storage regions for greater flexibility and security. Read More
Security Awareness 14 April 2022 IT Security Awareness in Healthcare – Not Highly Prioritized Despite Rising Cyberattacks Read More
Microsoft 365 08 April 2022 What are the Frontline Worker SKUs in M365 and Who are they for? Read More
A Breakdown of CSRB’s Findings on Microsoft Storm-0558 Breach (PART 2) Podcast 02 May 2024 Today’s episode of the Security Swarm Podcast is a continuation from last week’s episode where… Read more
The Value of a Single Third-Party Vendor Strategy for M365 Security Microsoft 365 16 August 2024 Cybersecurity is an interesting space to be in, because it’s changing so fast. This, combined… Read more