article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

B2B If you are a shared workspace company, for example, your followers are likely interested in ways to establish network security in a hybrid workplace. Followers of a hiring software company likely want to see how to hire more securely online.

Media 89
article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

These baseline account takeovers can then be leveraged to spread spam, distribute phishing scams, launch denial of service attacks, infiltrate and plunder networks, execute wire fraud and more. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.

article thumbnail

The story of the year: remote work

SecureList

Scam and phishing. One of the most common concerns for workers is related to phishing scams. According to Kaspersky telemetry, the amount of scam related to social payments increased fivefold in 2020 compared to the same period in 2019. The design was so close to the original that only the URL gave away the scam.

Scams 61