top of page
![](https://static.wixstatic.com/media/54de26_2ff45ba6085b408ca34b3e9ae431c51f~mv2.jpg/v1/fill/w_521,h_293,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/54de26_2ff45ba6085b408ca34b3e9ae431c51f~mv2.jpg)
![Webcheck logo White.png](https://static.wixstatic.com/media/54de26_3f885c0c35f64065bdd325bfcf839f6c~mv2.png/v1/fill/w_235,h_72,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/Webcheck%20logo%20White.png)
World-Class Cyber Services
Cyber Services Delivered with a CX
Search
![](https://static.wixstatic.com/media/nsplsh_c9bb5f429bfc464a89fb965eb8c75b5a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_c9bb5f429bfc464a89fb965eb8c75b5a~mv2.webp)
![Google Authenticator Made a Breach So Much Worse](https://static.wixstatic.com/media/nsplsh_c9bb5f429bfc464a89fb965eb8c75b5a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/nsplsh_c9bb5f429bfc464a89fb965eb8c75b5a~mv2.webp)
Ben Card
Sep 20, 20237 min read
Google Authenticator Made a Breach So Much Worse
A security company is calling out a feature in Google's Authenticator app that it says made a recent network breach much worse.
33 views0 comments
![](https://static.wixstatic.com/media/54de26_fd4a754962e04629a45bb2dd6a70b4b8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/54de26_fd4a754962e04629a45bb2dd6a70b4b8~mv2.webp)
![Best Practices for Effective Phishing Campaigns](https://static.wixstatic.com/media/54de26_fd4a754962e04629a45bb2dd6a70b4b8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/54de26_fd4a754962e04629a45bb2dd6a70b4b8~mv2.webp)
Ben Card
Mar 6, 20234 min read
Best Practices for Effective Phishing Campaigns
10 Things You Can Do To Improve Your Phishing Campaigns
85 views0 comments
![](https://static.wixstatic.com/media/54de26_19f97a630bce4547a9f2614642ab4c5d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/54de26_19f97a630bce4547a9f2614642ab4c5d~mv2.webp)
![Phishing Simulation - A Look At The Numbers](https://static.wixstatic.com/media/54de26_19f97a630bce4547a9f2614642ab4c5d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/54de26_19f97a630bce4547a9f2614642ab4c5d~mv2.webp)
Ben Card
Feb 20, 20233 min read
Phishing Simulation - A Look At The Numbers
Social engineering attacks are one of the most widespread and impactful forms of cybercrime that all organizations face.
77 views0 comments
![](https://static.wixstatic.com/media/nsplsh_780177bae186430d8f76d8060ff85b67~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_780177bae186430d8f76d8060ff85b67~mv2.webp)
![New Use of Windows Security Bypass for Malware Delivery](https://static.wixstatic.com/media/nsplsh_780177bae186430d8f76d8060ff85b67~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/nsplsh_780177bae186430d8f76d8060ff85b67~mv2.webp)
Ben Card
Nov 22, 20222 min read
New Use of Windows Security Bypass for Malware Delivery
Researchers have found that a new phishing attack is able to take advantage of a Windows zero-day flaw to deliver malware.
17 views0 comments
![](https://static.wixstatic.com/media/nsplsh_e85f147571d447acbeb0230ac39eb6de~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_e85f147571d447acbeb0230ac39eb6de~mv2.webp)
![Hackers Deploying Malware in PNG Files](https://static.wixstatic.com/media/nsplsh_e85f147571d447acbeb0230ac39eb6de~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/nsplsh_e85f147571d447acbeb0230ac39eb6de~mv2.webp)
Ben Card
Nov 15, 20222 min read
Hackers Deploying Malware in PNG Files
Researchers have recently become aware of a threat group, dubbed “Worok”. They are hiding malware inside of PNG files to infect computers.
53 views0 comments
![](https://static.wixstatic.com/media/11062b_ffb4c1867df144499c5fa046a78acd1d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/11062b_ffb4c1867df144499c5fa046a78acd1d~mv2.webp)
![Security Awareness Training: A High-Value Program](https://static.wixstatic.com/media/11062b_ffb4c1867df144499c5fa046a78acd1d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/11062b_ffb4c1867df144499c5fa046a78acd1d~mv2.webp)
Ben Card
Oct 27, 20224 min read
Security Awareness Training: A High-Value Program
Building a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
27 views0 comments
![](https://static.wixstatic.com/media/54de26_222fb49dca6940f8834ff5d1077d20a2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/54de26_222fb49dca6940f8834ff5d1077d20a2~mv2.webp)
![Facebook Business Accounts Being Hijacked by Ducktail Malware](https://static.wixstatic.com/media/54de26_222fb49dca6940f8834ff5d1077d20a2~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/54de26_222fb49dca6940f8834ff5d1077d20a2~mv2.webp)
Ben Card
Oct 17, 20222 min read
Facebook Business Accounts Being Hijacked by Ducktail Malware
“Ducktail” information stealing malware has a new PHP-based variant has been spreading across the Internet via cracked installers
15 views0 comments
![](https://static.wixstatic.com/media/nsplsh_c84564e429b64cd2802f9cfa60579ebb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/nsplsh_c84564e429b64cd2802f9cfa60579ebb~mv2.webp)
![It's Time to Do More to Secure Your Email](https://static.wixstatic.com/media/nsplsh_c84564e429b64cd2802f9cfa60579ebb~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/nsplsh_c84564e429b64cd2802f9cfa60579ebb~mv2.webp)
Ben Card
May 16, 20221 min read
It's Time to Do More to Secure Your Email
Attackers are increasingly turning to phishing as the way into companies' networks and many organizations are making it easy to do so.
30 views0 comments
bottom of page