Maku MiahRansomwareCybercriminals are targeting government, healthcare, and education organizations with ransomware. While an uptick in attacks was expected…Dec 3, 2020Dec 3, 2020
Maku MiahEmail threat types: Data exfiltrationData exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices…Nov 26, 2020Nov 26, 2020
Maku MiahEmail threat types: MalwareEmail attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment…Nov 19, 2020Nov 19, 2020
Maku MiahEmail threat types: SpamSpam is unsolicited bulk email messages, also known as junk email. Spammers typically send an email to millions of addresses, with the…Nov 11, 2020Nov 11, 2020
Maku MiahEmail threat types: Domain ImpersonationDomain impersonation, also known as typo squatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate…Nov 5, 2020Nov 5, 2020
Maku MiahEmail threat types: Lateral phishingA recent study revealed that 1 in 7 organizations has experienced a lateral phishing attack. In this type of attack, criminals use…Oct 22, 2020Oct 22, 2020
Maku MiahEmail threat types: ExtortionExtortion and sextortion attacks are increasing in frequency and sophistication. The criminal contacts potential victims by email and…Oct 15, 2020Oct 15, 2020
Maku MiahEmail threat types: URL phishingA URL phishing attack is an attempt to obtain sensitive information such as usernames, passwords, and other details. In this type of…Oct 8, 2020Oct 8, 2020
Maku MiahEmail threat types: Account takeoverAccount takeover, also known as an ATO or an account compromise attack, is a type of identity theft where criminals gain access to a…Oct 1, 2020Oct 1, 2020
Maku MiahEmail threat types: Brand impersonationBrand impersonation is an attack that impersonates a company or brand to hide the malicious intent of an email. The idea behind it is that…Sep 24, 2020Sep 24, 2020