Wondering what BIMI is and how is it a process booster for outbound email authentication? Don’t worry we have managed to bring together all the necessary information in place. …
Saudi Aramco Confirms $50M Extortion Attempt After Data Leak
Saudi Arabia’s oil giant Aramco has recently acknowledged that a data leak took place in their organization. This data leak has led to an extortion attempt where hackers have demanded…
Student Data Leak Due to Cyber Attack in Israel Clocks 280K
Another day, another data leak! According to a report in the Jerusalem Post, the data of around 280000 students has been leaked after a cyber attack. It is being suspected…
Vishing Attack Hits Thousands of Inboxes
An article by Threat Post reveals that a vishing attack, launched with the help of emails in the name of Geek Squad and Norton Antivirus, managed to reach 25k email…
7 Million Cyber Attacks Hit Saudi Arabia in 2021
According to an article published by Arab News in the month of March 2021, Saudi Arabia became the target for 7 million cyber attacks only in the first two months…
Majority CISOs in the UAE Feel Unprepared for Cyber Attacks
Cyber attacks have become one of the most potent threats to global businesses in 2021. This is because of the increased level of vulnerability due to remote working culture and…
64% Rise in Email Threats Against Global Businesses in 2020
Among all kinds of cyber threats that exist in this landscape, email threats have been the most stubborn and long-lasting kind. They have been here for ages and are not…
DMARC Policy: #1 Email Security Objective for CISOs
The year 2020 witnessed a sharp rise in the number of email domains using Domain based Message Authentication, Reporting, and Conformance (DMARC). According to a recent report by DMARC.org, this…
Social Engineering Attacks CISOs Should Watch Out For
Cyber risks have become the main talking point for most organizations. With organizations around the globe coming under attack, the financial losses sustained due to cyber threats have been huge.…
VEC Attacks : An Emerging Threat
For understanding the concept of VEC attacks (Vendor Email Compromise), it is important to first understand Business Email Compromise (BEC) attacks. So let’s start off by getting a general idea…
- 1
- 2