Latest News

Red Team vs Blue Team

Red Team vs Blue Team

Privasec at FST Media

In 2019, attackers are phishing targets to retrieve sensitive information that ultimately leads to data compromise. Phishing is the technique where a malicious actor lures a victim into revealing sensitive information. This can be through large “spray-and-pray” type campaigns involving multiple recipients or, a more targeted approach crafting attacks for specific individuals, known as Spear Phishing. Phishing has been around since the early days of the Internet as one of the oldest vectors of attack.

Phishing

Phishing provides a very successful avenue to obtain credentials for hackers. The simplest and most efficient way to achieve this is by redirecting users to a website with some sort of submission form. With a little bit of effort such as purchasing domains with similar names and using tools to scrape and mirror legitimate website content, an attacker can forge a highly-convincing scenario.

CYBAR 2019

Simply putting your data into a cloud service does not guarantee its security. As cloud based services deliver rapid, cost-effective and commoditised business IT solutions, security and information risks increase.

Cloud Security