Cyber Talk

NIST Framework 2.0: A Comprehensive Overview

Today, the security of sensitive information and digital assets is a top priority for organizations globally. The National Institute of Standards and Technology (NIST) Cybersecurity Framework 2.0 stands as a potent and adaptable instrument, aimed at aiding organizations of varying sizes in navigating the intricate terrain of cybersecurity. Developed by NIST, a renowned authority in

Deepfake: What They Are, How to Recognize Them

In recent times, the proliferation of fake news supported by seemingly authentic images has become increasingly common. This particular form of multimedia manipulation is referred to as a deepfake. One of the most striking examples is the fake photo depicting the explosion at the Pentagon, which led to a significant stock market crash. Another instance

Safeguarding Your Privacy: How to Protect Against Camfecting Attacks

Camfecting Attacks Introduction: With technology's rapid advancement, online privacy and security have become increasingly vulnerable. Camfecting, a malicious attack that hijacks a device's webcam without authorization, is a significant concern in the digital landscape. In this article, we will explore what camfecting entails, its modus operandi, the risks it poses, and provide actionable steps to

Malware: What They Are and How to Protect Your PC and Data

When it comes to cybersecurity, we often think of high-level hackers stealing crucial government and corporate data. In this article, we will delve into an important and often underestimated topic that affects many individual users: malware. While the term may sound like something out of a science fiction movie, it is actually a much more

How to Create a Strong Password in 10 Easy Steps

Creating a secure password is one of the first steps that users should consider to protect their accounts - and therefore their data - online. In today’s digital world we use passwords to access a lot of information, from email to social networks, to banking applications and more. Basically, if someone could have your password,

Phishing Kits: The New Frontier of Hacker Attacks

The exponential growth of online fraud is mainly due to the emergence of fraud scams. Compared to more common forms of fraud, phishing is a lot more dangerous and accessible to all. The latest quarterly report of the Anti-Phishing Working Group APWG confirms this, revealing that only in January-March 2021, there were over 611,000 phishing

Brand phishing: which brands are most used by cyber criminals?

Whilst phishing attacks continue to become more sophisticated, it is possible, through Ermes technology, to collect data and insights on those attacks.   In this article Ermes offers several interesting observations and insights, such as the most phished categories as well as the brands they most frequently target.  We will also take a deeper dive into

3 types of phishing attacks that target your company

New Trends and Phishing Attacks: What are the new trends in phishing attacks? The goal of the article is to provide an overview of the latest phishing attacks, to create awareness and offer concrete solutions Phishing attacks have steadily increased worldwide during 2021-2022 with a devastating cost for each successful data breach. Moreover, these attacks

Go to Top