Fraud

How Did Two Men Commit a $3M Online Gambling Fraud?
Identity & Access Management How Did Two Men Commit a $3M Online Gambling Fraud?

A sprawling 45-count federal indictment has brought to light a sophisticated scheme, revealing how two Connecticut men allegedly manipulated the burgeoning online gambling industry to fraudulently acquire approximately $3 million. Amitoj Kapoor and Siddharth Lillaney, both 29-year-old residents of

Miami Management Breach Exposes 4.9 TB of PII
Identity & Access Management Miami Management Breach Exposes 4.9 TB of PII

A prominent South Florida property management company has become the latest victim in a string of sophisticated cyberattacks, resulting in the exfiltration of a staggering 4.9 terabytes of personally identifiable information (PII). Miami Management, a leader in its regional market, recently

Is Your MFA Vulnerable to Vishing Attacks?
Infrastructure & Network Security Is Your MFA Vulnerable to Vishing Attacks?

Multi-factor authentication was once hailed as a nearly impenetrable shield for digital accounts, but a sophisticated wave of social engineering attacks is proving that even this robust defense mechanism has a critical vulnerability: the human element. Recent intelligence has revealed an alarming

Warning Issued Over Fake Bank and HMRC Letters
Identity & Access Management Warning Issued Over Fake Bank and HMRC Letters

Today we're joined by Rupert Marais, our in-house Security Specialist, whose expertise in cybersecurity and device security gives him a unique perspective on how modern fraud operates. We’ll be exploring the surprising resurgence of old-school postal scams, delving into the sophisticated

Can LatAm Bridge Its Cyber Skill and Confidence Gap?
Security Operations & Management Can LatAm Bridge Its Cyber Skill and Confidence Gap?

Today we're joined by Rupert Marais, our in-house security specialist, to unpack the complex and urgent cybersecurity crisis facing Latin America. As the region accelerates its digital transformation, a perfect storm is brewing: a staggering lack of confidence in national cyber defenses, a critical

Shadow#Reactor Uses Text Files to Deliver Remcos RAT
Identity & Access Management Shadow#Reactor Uses Text Files to Deliver Remcos RAT

The most dangerous threats in cybersecurity are often not the ones that announce their presence with a bang, but those that whisper their way past defenses hidden within the most mundane of digital artifacts. A sophisticated malware campaign, dubbed Shadow#Reactor, has brought this concept to the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later