IoT Attack Surface: Where are the Weak Links?

IoT households are generally deemed more exposed to digital threats due to the large number of internet-connected devices, but some devices are more prone to attacks than others. Internet devices used as entry points in cyber attacks It’s no longer a secret that...

Fake police call cryptocurrency investors to steal their funds

Have you had a phone call from police about your cryptocurrency wallet? Be on your guard - you could be about to be scammed. That's the clear warning issued by police in England, as it was disclosed how nine people have lost a combined £1 million in a phone-related...

Email Security Trends and Attack Techniques in Microsoft 365

Email remains a cornerstone of business communication, and thus is also continues to be a primary vector for cyber-attacks. Despite the rise of collaboration tools like Microsoft Teams, email's ubiquity makes it a prime target for threat actors.  The post Email...