DoH and Phishing Risks. What You Need to Know Now

As we continue to transition our lives to the digital world, our digital footprint continues to grow. As our data is collected and sold without our knowledge and consent, it has made employees and consumers more aware of the potential privacy risks to … Continue reading DoH and Phishing Risks. What You Need to Know Now

SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Users of a Secure Email Gateway (SEG) are protected from most phishing, yet emails with malicious URLs still get through. To address the issue, SEG vendors have added isolation technologies to their security stacks. It is often marketed as email isolat… Continue reading SEGs Haven’t Stopping Phishing, So Email Isolation is Next, Hold On

Browser Extensions, an Overlooked Phishing Attack Vector

As users continue to leverage browser extensions to save time and increase productivity it is attracting the attention of cybercriminals. Learn how malicious extensions are making their way into the official stores and how to stay safe.
The post Browse… Continue reading Browser Extensions, an Overlooked Phishing Attack Vector