Pig butchering scams: what are they and how to spot them

Pig butchering scams: what are they and how to spot them

Over the last few years a new type of financial scam (largely around cryptocurrency) has emerged that takes advantage of social engineering techniques. It’s known as “pig-butchering.”  The name comes from the fact that scammers work hard to build trust with the...

Risk assessment social engineering

#CISO, If you call your servers, laptops, stations, firewalls, routers, mobile phones and faxes – The stuff, so stop reading now. But you don’t. You do an asset list, with specific risk for each asset, mitigation plan and monitoring. Same you need to do with...
3 coworking cybersecurity risks to be aware of

3 coworking cybersecurity risks to be aware of

Since the pandemic, the use of coworking spaces has increased as more companies want to give their employees flexibility around how they work. In the US in 2022, more than 1m people worked in co-working spaces, compared to just 331,000 in 2015, and more than one third...
What is Ransomware-as-a-Service (RaaS)?

What is Ransomware-as-a-Service (RaaS)?

The number of ransomware attacks have been increasing in recent years, and this is partly linked to the rise of Ransomware-as-a-Service. But what is it and how does it work? What is RaaS? Ransomware-as-a-Service (RaaS) is a subscription-based business model used by...