Recent Posts

Breaches & Hacks

/*! elementor - v3.6.7 - 03-07-2022 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px} Salesforce Phishing Awareness Being in the spotlight does not get the attention of just the right audience but the wrong ones too. When it comes to CRM, Salesforce, the company, has quite literally taken the place of the actual definition of Sales Force. Googling for Sales Force, employees of a company responsible for selling...

Read More

PREVENT PHISHING BY AWARENESS Based on a survey conducted in 2021, Salesforce dominated the CRM market with a whopping market share of 24%, which is greater than the market share of its next 4 competitors combined. In the following 2 years the revenue of Salesforce has on an average grown by 25% Y-O-Y; safe to say that they have retained market dominance. The platform boasts of...

Read More

Lastpass, the password manager application, had reported that it found a security breach back in August. The perpetrator had supposedly stayed in the network for only 4 days and had access only to the development environment and not to the customer data or the password vaults. The threat actor had gained access to the development environment through one of the developer's endpoint by impersonating as...

Read More

Attack Methodology Phishing Email You receive a phishing email with a malicious file Stage 1 Microsoft Office File The attachment is a Microsoft Office file with a malicious macro. Upon opening the file and allowing the macro to run, the next step is triggered Stage 2 James Webb Image File The macro downloads the image file that contains the encoded code that gets converted to binary and...

Read More