phishing

The Most Malicious Threat Actors Using Email

Cyberattacks using the email vector has been the most widely used attack vector for the past few years, including this year. Threat actors are spreading ransomwares, trojans, malwares, and more with a simple email. In this blog, we will review the breakdown and the average penetration ratio per[...]

November Cyberattacks Wrap-up

November's Cyberattacks In our monthly wrap-up, we cover the latest cyberattacks highlighting the attack methods and payloads used by malicious hackers and cybercriminals. The month ended with Marriott disclosing that it had been the victim of a large-scale data breach. The data of around 500[...]

A Guide to Stay Cybersafe This Holiday Season

Cymulate wishes you a cybersafe Holiday Season! The holiday season is a time of joy and celebration, and as we all know, lots of shopping. With Black Friday, Cyber Monday, and Christmas shopping, the amount of shopping drastically increases, specifically online shopping. In a report released by[...]

Phishing Attacks: The Phishermen Who Might Reel You In

Whether you are a Cyber security professional or any other employee within an organization, you have probably heard the term “phishing” on and off over the past few years. You might have had face-to-face presentations, watched videos, seen slide decks, taken quizzes, or even had a few phishing[...]

Academia Up for Grabs

Academia is Still a Preferred Target for Cyberattacks. In our blog post of June 6 last year, we wrote that although the attacks in the academic sector had received much less media attention than those in other sectors, academic institutions have been favorite targets of cybercriminals for over 3[...]

Cyberattack and the City

Smart cities have become a lucrative target for cyber attackers due to the increasing number of connected systems embedded throughout the smart city’s infrastructure. The numbers talk volumes - global investment in smart cities will reach $80bn in 2018, and is expected to reach $135bn by 2021[...]

Dark Web Shopping Center

Black Mirror – Looking at the dark web marketplace for cybercrime We all know about cybercriminals, but do we also understand where they get their tools of the trade? Let’s go the dark side and have look at the black mirror reality of the cybercrime marketplace.

SMBs - The Cybercrook’s Favorite Snack

Cybercrooks just love going after small and medium-sized businesses since they are more vulnerable to cyberattacks than large organizations that have cybersecurity teams and top-notch security solutions in place. This makes those smaller organizations not only more vulnerable, but attacking them[...]

Still Phishing in Troubled Waters

You might think that we have become good at identifying phishing attacks today, but that’s a dangerous assumption. The frightening truth is, that around 90% of all cyberattacks start with a phishing or spear phishing email.

It's 2018 and Cyber Attacks Using Email Haven’t Gone Away  

Bad News - Attackers Are Launching Email Based Cyber Attacks As Never Before Just as in 2016 and 2017, cyber criminals, malicious hackers and nations keep on targeting email inboxes this year. Corporate email accounts have always been a favorable target and according to security experts, the BEC[...]