Cybermaniacs
182 FOLLOWERS
A cyber security awareness solution for organisations both large and small. Our cloud based platform is an interactive and engaging learning experience. Based on human behaviour and cultural principles, delivered in short video driven micro learning segments, this is cyber awareness like you have never seen before.
Cybermaniacs
5d ago
Automated phishing tools certainly make personal email safer by catching spam and phishing attempts more quickly. But the truth is that no system is perfect, and sometimes phishing emails get through without being caught. But what happens when scammers and letters like this stop being sent so often ..read more
Cybermaniacs
1w ago
In the quickly evolving world of cyber risk management, many organizations find themselves tethered to outdated methods. Often constrained by budget limitations, time, or simply by adhering to long-standing practices, the reliance on routine measures like training simulations, obligatory learning sessions, or monotonous presentations has failed to genuinely drive behavior change. To address the nuances of human cyber risk, there's more we can and need to do ..read more
Cybermaniacs
1w ago
Brewing Trouble: Nespresso Domain Hijacked in Phishing Attack Targeting Microsoft Logins
In the caffeinated world of cybersecurity, a bitter brew is percolating as cybercriminals exploit the aroma of legitimacy wafting from Nespresso's domain to lure unsuspecting victims into their phishing trap. This recent event serves as a stark reminder that even the most innocuous of URLs can be ground into a weapon in the hands of malicious actors ..read more
Cybermaniacs
1w ago
Key Considerations for CISO’s in the wake of the CRSB’s Report
on the MSFT Breach
As we all know, the need for cybersecurity is still on the rise, and I’d argue that it's become increasingly clear how our traditional, tech-centric defenses aren't enough. The recent report from the Cyber Safety Review Board on the Microsoft breach brought this into sharp focus. This wasn't just about technological failures; it was also about human errors and organizational culture—factors that traditional cybersecurity strategies often overlook, push to the side, or discount as ‘not as important to the mission ..read more
Cybermaniacs
3w ago
In the intricate labyrinth of cybersecurity, where threats lurk in the shadows of every digital transaction, policies emerge as the guiding beacons, illuminating the path to safety, security standards, and integrity. In an era where data is king and our interconnected world operates on the complex algorithms of digital language, these policies serve as protective shields for our organizations ..read more
Cybermaniacs
1M ago
BEC Attacks on the Rise: Unveiling the Landscape
The digital realm is witnessing a surge in BEC attacks, with threat actors perfecting the art of email address spoofing and infiltrating compromised accounts with alarming ease. What was once primarily a tool against financial institutions has evolved into a versatile threat, with recent FBI advisories revealing cybercriminals orchestrating BEC attacks to steal high-value shipments, illustrating the adaptability and audacity of these schemes ..read more
Cybermaniacs
1M ago
When it comes to phishing, these deceptive tactics are like a game of cat and mouse, with attackers constantly refining their methods to outsmart even the most vigilant of defenses ..read more
Cybermaniacs
1M ago
In a world where our mobile devices are practically extensions of ourselves—holding everything from our various bank accounts and deets to those cringe-worthy dance videos—we've got to talk about keeping them Fort Knox-level secure. Especially if you're like us, juggling work emails, financial records, and running the show from your phone as a pocket-sized genius.  ..read more
Cybermaniacs
1M ago
Riding the Cybersecurity Wave
Welcome to the ever-changing world of business cybersecurity, where technological progress gives rise to a constant stream of cybersecurity threats. As security leaders, our role is to stay ahead of these threats, from intricate phishing tactics to pervasive data breaches and of course, crippling ransomware attacks ..read more