top of page
Gold Comet Blog


Business Email Compromise (BEC): Why Email Security is So Important
Business Email Compromise (BEC) is growing rapidly as cybercriminals become more sophisticated in their security breach strategies.
Jan 4, 20232 min read
Â


Data Protection and Security: Phishing, Smishing, and Vishing (Part 1 of 4)
Cybercriminals are getting more creative in the strategies they use to interfere with data protection and security.
Oct 25, 20225 min read
Â


Email Hacker Threats Today: HYPERSCRAPE Malware
Hyperscrape, an email-scraping tool, allows attackers to steal emails from inboxes without leaving much evidence of the attack.
Sep 14, 20222 min read
Â


Business Email Compromise (BEC) Attacks
Post on BEC, which tricks company employees using email into making sensitive business information accessible to cybercriminals.
Oct 23, 20202 min read
Â


What Is Social Engineering?
Social engineering - a form of manipulation and psychological trickery to deceive others into divulging sensitive information.
Sep 25, 20203 min read
Â


Network Access Control: Blacklisting vs. Whitelisting
A discussion of blacklisting and whitelisting as network access control methods for protecting systems and data from malicious intrusions.
Jul 9, 20204 min read
Â
bottom of page
