Fraud

Scam Clothing Sites Misuse Home Addresses for Returns
Identity & Access Management Scam Clothing Sites Misuse Home Addresses for Returns

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we're diving into a troubling trend in online scams, specifically how fraudulent clothing websites are

TikTok Videos Spread Malware via ClickFix Cyber Attacks
Data Protection & Privacy TikTok Videos Spread Malware via ClickFix Cyber Attacks

Defining the Purpose of This Guide This how-to guide is designed to equip users with the knowledge and tools necessary to safeguard their digital security against a growing cyberthreat: malware distribution through TikTok videos using ClickFix attacks. By following the detailed steps and advice

Iranian Hackers Exploit SSL.com Certificates for Malware
Identity & Access Management Iranian Hackers Exploit SSL.com Certificates for Malware

In a disturbing turn of events that has sent ripples through the cybersecurity community, Iranian state-sponsored hackers, identified as UNC1549, have been uncovered using digital certificates from SSL.com, a Houston-based certificate authority, to sign malicious software with alarming success.

How Did a £28M Timeshare Fraud Devastate Thousands?
Identity & Access Management How Did a £28M Timeshare Fraud Devastate Thousands?

What happens when a dream of endless vacations turns into a financial nightmare for thousands of vulnerable people across the UK? Picture an elderly couple, having saved for decades, hoping to offload a burdensome timeshare, only to lose everything to a polished scam promising salvation. This is

BBC Exposes £28M Timeshare Fraud with Secret Filming
Identity & Access Management BBC Exposes £28M Timeshare Fraud with Secret Filming

Imagine a promise of endless sunny vacations turning into a suffocating financial burden, draining life savings with no escape in sight, a nightmare that became reality for thousands of unsuspecting timeshare owners. For these victims, the dream of holiday freedom morphed into a trap as they fell

Which ATO Protection Tools Lead in 2025 Cybersecurity?
Identity & Access Management Which ATO Protection Tools Lead in 2025 Cybersecurity?

In the dynamic and ever-evolving digital landscape of 2025, businesses across sectors such as e-commerce, banking, healthcare, and software-as-a-service (SaaS) face an unrelenting threat from account takeover (ATO) attacks, which are often executed through credential stuffing, phishing, and

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later