Skip to content
10 Articles

Real World Attacks

All articles in this topic area, organized by difficulty level.

Intro (10)

Bec And Invoice Fraud How Money Actually Walks Out

Practical SMB guidance on Bec And Invoice Fraud How Money Actually Walks Out from a business owner's perspective.

Intro5 min

Credential Stuffing And Reused Passwords

Practical SMB guidance on Credential Stuffing And Reused Passwords from a business owner's perspective.

Intro5 min

Fake Support Calls And Helpdesk Social Engineering

Practical SMB guidance on Fake Support Calls And Helpdesk Social Engineering from a business owner's perspective.

Intro5 min

How To Prepare For A Vendor Breach

Step-by-step guide to Prepare For A Vendor Breach.

Intro5 min

How To Read A Breach Report And Apply IT To Your Business

Step-by-step guide to Read A Breach Report And Apply IT To Your Business.

Intro5 min

Infostealers Why Saved Passwords Get You Owned

Practical SMB guidance on Infostealers Why Saved Passwords Get You Owned from a business owner's perspective.

Intro5 min

Lookalike Domains And Brand Impersonation

Practical SMB guidance on Lookalike Domains And Brand Impersonation from a business owner's perspective.

Intro5 min

Phishing Examples That Fool Smart People

Practical SMB guidance on Phishing Examples That Fool Smart People from a business owner's perspective.

Intro5 min

Ransomware The Real Playbook Not Movie Hacking

Practical SMB guidance on Ransomware The Real Playbook Not Movie Hacking from a business owner's perspective.

Intro5 min

Zero Days And Why Your Router Is A Target

Practical SMB guidance on Zero Days And Why Your Router Is A Target from a business owner's perspective.

Intro5 min