Acquire
OSINT, hackers and phishing

OSINT, hackers and phishing

OSINT, hackers and phishing

How hackers use OSINT for their phishing attacks

What is OSINT (Open Source INtelligence) and how do hackers use it for their phishing attacks?

Mantra Team
Hacking

Most popular

More reads

Frequency and timing of phishing simulation campaigns

Frequency and timing of phishing simulation campaigns

Frequency and timing of phishing simulation campaigns

Best Practices

Frequency and timing of phishing simulations

What is the right frequency and timing of your phishing simulation campaigns to make them the most effective? Mantra's data team has a look at this issue.

Mantra Team
The world of hackers: Initial Access Brokers

The world of hackers: Initial Access Brokers

The world of hackers: Initial Access Brokers

Hacking

Initial Access Brokers - who are they, what do they do, and how can you protect yourself?

Who are Initial Access Brokers and what do they do? What are some of their techniques, and how can you protect your company against them?

Mantra Team
The psychology behind the click on a phishing email

The psychology behind the click on a phishing email

The psychology behind the click on a phishing email

Cybersecurity

Why do people click? The psychology behind it all

What are the drivers at play that lead to people clicking on phishing emails? And what can companies do about this to bolster their cybersecurity?

Mantra Team
Lifecycle of a cyberattack

Lifecycle of a cyberattack

Lifecycle of a cyberattack

Hacking

From phishing to ransomware: an overview of the lifecycle of an attack

Why does a simple phishing email threaten an entire company? How do hackers move on from a low-level account to significant privileges, and, eventually, deploy a ransomware?

Mantra Team
Gamification & Cybersecurity

Gamification & Cybersecurity

Gamification & Cybersecurity

Best Practices

Why gamification can contribute to your cybersecurity?

Why do humans love to play? And how can using these principles and relying on gamification help your cyberdefense?

Mantra Team
Anti-spam protections can be bypassed by hackers

Anti-spam protections can be bypassed by hackers

Anti-spam protections can be bypassed by hackers

Hacking

How hackers bypass anti-spam to deliver phishing emails

Anti-spams are great! But hackers have elvoved to counter them and developed techniques to bypass them and successfully execute phishing campaigns.

Mantra Team
Icon

Suscribe to our newsletter

All the content you need to stay up to date on the latest cyber security trends
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.