How hackers use OSINT for their phishing attacks
What is OSINT (Open Source INtelligence) and how do hackers use it for their phishing attacks?
Our reasoning about the best format for your cybersecurity awareness program
Some of our best-performing phishing simulation scenarios as observed in campaigns with various companies
Here are 10 must-haves for any training to be effective at lastingly changing users' behavior with regard to phishing attacks.
What is the right frequency and timing of your phishing simulation campaigns to make them the most effective? Mantra's data team has a look at this issue.
Who are Initial Access Brokers and what do they do? What are some of their techniques, and how can you protect your company against them?
What are the drivers at play that lead to people clicking on phishing emails? And what can companies do about this to bolster their cybersecurity?
Why does a simple phishing email threaten an entire company? How do hackers move on from a low-level account to significant privileges, and, eventually, deploy a ransomware?
Why do humans love to play? And how can using these principles and relying on gamification help your cyberdefense?
Anti-spams are great! But hackers have elvoved to counter them and developed techniques to bypass them and successfully execute phishing campaigns.