Phishing using FB infrastructure stealing business-account passwords
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
8 articles
Cybercriminals are using genuine Facebook infrastructure to send phishing emails threatening to block accounts.
Fraudsters are buying blue checkmarks to impersonate well-known brands on X (ex-Twitter) and scam users.
We explain what the Fediverse is, how it works, where you can experience it today, and what to expect in the future.
The decentralized Mastodon social network claims to be a different breed of social network. Here’s how it works and how to use it without compromising privacy and security.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
You can apply the concept of a threat landscape as used in corporate security to yourself to make it easier to stay protected.
Why you should purge your company’s LinkedIn page from fake employee profiles, and how to do it.