Vishing (Voice Phishing)

Vishing (Voice Phishing) What is it and how can we defend against it. Vishing (short for voice phishing) is a type of social engineering attack where cybercriminals use phone calls or voice messages to trick individuals into revealing sensitive information or performing actions that compromise security. Here’s how it works: Impersonation: The attacker pretends to be someone trustworthy—like a […]

Angler Phishing

Angler Phishing What is it and how can we defend against it Angler Phishing is a type of social media-based phishing attack where cybercriminals impersonate customer service accounts or trusted brands to deceive users into giving up sensitive information. Here’s how it works: Impersonation: Attackers create fake social media profiles that closely resemble legitimate customer support accounts (e.g., […]

Pharming

Pharming What is it and how can we defend against it. Pharming is a type of cyberattack that redirects users from legitimate websites to fraudulent (fake) websites without their knowledge, even if the user types the correct URL into their browser. The goal is to steal sensitive information like login credentials, credit card numbers, or personal data. Here’s […]

Clone Phishing

Clone Phishing What is it and how can we defend against it. Clone phishing is a type of phishing attack where a legitimate and previously delivered email is used as a template to create a nearly identical – but malicious – version. The attacker replaces the original links or attachments with malicious ones and sends the cloned email […]

Smishing (SMS Phishing)

Smishing (SMS Phishing) What is it and how can we defend against it. Smishing (short for SMS phishing) is a type of cyberattack where attackers use text messages (SMS) to trick individuals into revealing personal information, downloading malware, or clicking on malicious links. Here’s how it works: Deceptive Message: You receive a text that appears to be from a […]

Spear Phishing

Spear Phishing What is it and how can we defend against them Spear phishing is a targeted form of phishing attack where cybercriminals tailor their deceptive messages to a specific individual, organisation, or business. Unlike general phishing, which casts a wide net hoping someone will fall for the scam, spear phishing is highly personalised and […]

Ransomware

Ransomware What is it and how can we defend against it. Ransomware is a type of malware that encrypts a victim’s files or locks them out of their system, then demands a ransom payment (usually in cryptocurrency) to restore access. Here’s how it works: Infection: Often begins through phishing emails, malicious downloads, or exploiting vulnerabilities. Encryption: The malware encrypts files […]

Malware

Malware What is it and how can we defend against it. Malware (short for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or network. It’s a broad category that includes various types of harmful programs used by cybercriminals to steal data, disrupt operations, or gain unauthorised access to systems. Common […]

Zero-Day Exploit

Zero-Day Exploit What is it and how can we defend against them A Zero-Day Exploit is a type of cyberattack that takes advantage of a previously unknown vulnerability in software or hardware – one that the vendor or developer has had “zero days” to fix because they are unaware of it. Key Concepts: Zero-Day Vulnerability: A flaw […]

Advanced Persistent Threat (APT)

Advanced Persistent Threat (APT) What is it and how can we defend against them An Advanced Persistent Threat (APT) in cybersecurity refers to a prolonged and targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period. These attacks are typically carried out by well-funded and highly skilled threat actors, […]