Pauline Quéré

How to spot a spear phishing email blog post

Spear Phishing Series Part 2: How to Spot a Spear-Phishing Email

Having covered the rise of spear phishing and how easily criminals can collect information to create targeted attacks, we can now examine the different indicators that can be used to spot a…


How is a spear-phishing email created blog post image

Spear Phishing Series part 1: How a Spear-Phishing Email is Created

Spear-phishing is a much misunderstood topic in the business community. This is the first in a three-part series designed to help you understand how you can reduce your risk of being ‘caught’. These…


Hut Six Security blog image new branching tutorial feature

New from Hut Six: Scenario-based branching Tutorials

One of the greatest challenges when developing a secure culture within the work force is ensuring that employees are able and confident in applying knowledge gained through training. How can you…


Hut Six Security social engineering image

Micro-businesses are underestimating social engineering

Every day we see headlines dominated by big name corporates falling prey to cyber-attacks yet we rarely hear about Small Enterprise cases where the danger is just as great and the consequences…