Pauline Quéré
Spear Phishing Series Part 3: What to do if You’ve Been Phished
In the first two parts of this blog series, we examined the different methods used in the creation of spear-phishing attacks. If you didn’t have the chance to read our blogs and have…
Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email
Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…
Spear Phishing Series part 1: How a Spear-Phishing Email is Created
Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…
New from Hut Six: Scenario-based branching Tutorials
One of the greatest challenges when developing a secure culture within the work force is ensuring that employees are able and confident in applying knowledge gained through training. How can you…
Micro-businesses are underestimating social engineering
Every day we see headlines dominated by big name corporates falling prey to cyber-attacks yet we rarely hear about Small Enterprise cases where the danger is just as great and the consequences…