Tags: Ransomware


24 February, 2019
rawpixel-1055774-unsplash

BEC attacks, also known as CEO Fraud: the new threat that could destroy your business

We would like to dedicate our new post to BEC attacks (Business Email Compromise), also known as “CEO Fraud” which is becoming the latest nightmare for businesses. They are difficult to detect and could cause very serious damage and losses. We regularly read about incidents in the press where groups carry out these types of attacks. This shows us the speed at which these threats […]
12 November, 2018
cabecera blog post spamina (1)

Business Email Compromise: a sophisticated attack your company should avoid

Business Email Compromise (known as BEC) and CEO Fraud are two concepts that are, unfortunately, discussed with increasing frequency in company boardrooms and in the media. We only need to look back at last summer, when an FBI Operation (Operation WireWire) arrested 74 people worldwide that formed part of an international network that dedicated itself to BEC fraud. The operation avoided millions in planned losses. […]
30 July, 2018
sebastiaan-stam-573828-unsplash

History repeats itself: ransomware is here to stay

We have become so used to hearing about new ransomware cases, and over the last few months, it has become even more common hearing about these types of attacks on organizations all over the world. Something that was previously considered to be isolated cases is now turning into a headache for companies who are seeing their reputations and bottom lines affected by these threats. But […]
17 May, 2017
1366_2000

How to be prepared against a new wave of WannaCry

As we predicted, Ransomware attacks grew more than 50% in 2016 and this year the trend continues to grow; more than 50 different types have already been identified. Top market analysts in the latest published reports recommend hiring concrete solutions to protect from advanced threats because standard antivirus and anti-malware solutions work on identified patterns and signatures but are unable to detect zero-day attacks. How […]