Real World Attacks
All articles in this topic area, organized by difficulty level.
Intro (10)
Bec And Invoice Fraud How Money Actually Walks Out
Practical SMB guidance on Bec And Invoice Fraud How Money Actually Walks Out from a business owner's perspective.
Credential Stuffing And Reused Passwords
Practical SMB guidance on Credential Stuffing And Reused Passwords from a business owner's perspective.
Fake Support Calls And Helpdesk Social Engineering
Practical SMB guidance on Fake Support Calls And Helpdesk Social Engineering from a business owner's perspective.
How To Prepare For A Vendor Breach
Step-by-step guide to Prepare For A Vendor Breach.
How To Read A Breach Report And Apply IT To Your Business
Step-by-step guide to Read A Breach Report And Apply IT To Your Business.
Infostealers Why Saved Passwords Get You Owned
Practical SMB guidance on Infostealers Why Saved Passwords Get You Owned from a business owner's perspective.
Lookalike Domains And Brand Impersonation
Practical SMB guidance on Lookalike Domains And Brand Impersonation from a business owner's perspective.
Phishing Examples That Fool Smart People
Practical SMB guidance on Phishing Examples That Fool Smart People from a business owner's perspective.
Ransomware The Real Playbook Not Movie Hacking
Practical SMB guidance on Ransomware The Real Playbook Not Movie Hacking from a business owner's perspective.
Zero Days And Why Your Router Is A Target
Practical SMB guidance on Zero Days And Why Your Router Is A Target from a business owner's perspective.