In our previous blogs, first where we explained JavaScript Obfuscation techniques and introduced a detailed overview on how JavaScript is being used to obfuscate page content to make phishing attacks and other web scams as evasive as possible; followed…
Onboarding During A Pandemic: Can It Really Work? New Joiner, Lily Nguyen, Shares Her Experience.
I recently joined the Sales Development APAC team, looking after the Vietnam, Thailand and Hong Kong markets. I’d already had a great impression of Akamai’s culture from my interview rounds. But how would the onboarding work? I’d been looking forward t…
US: Collaboration Needed to Combat Online Child Exploitation
US assistant attorney general calls for civil society to work together to combat online child exploitation
Triple Data Breach Earns Insurer $1m Fine
Aetna agrees to pay $1m to settle three HIPAA breaches
Taiwanese Company Admits Stealing US Trade Secrets
UMC fined $60m for stealing trade secrets of US semiconductor business
Education Sector Facing Disproportionate Level of Spear-Phishing Attacks
Education institutions have been targeted by more than 3.5 million spear-phishing attacks from June to September
Employee Awareness Recognized as Biggest Lockdown Security Failing
Apricorn poll finds two-fifths of employees unprepared for remote working
Red Alert as US Hospitals Are Flooded with Ryuk Ransomware
Six facilities hit in a single day, forcing patients to divert
ICO Still Failing to Collect Fines from Unlawful Companies
Neary 70% of the total value of fines issued last year still outstanding
The Tale of Double JavaScript Obfuscated Scam
The phishing landscape is constantly evolving. Over the years, it has evolved into a more scalable threat, with an overwhelming amount of campaigns being launched daily. Phishing also changed when criminals started adding more capabilities and features…