GTconsult

Protection

Blog categorized as Protection

RFID Security Bypass: A Threat to Your Business?
Most companies focus on internet security with firewalls, patching, MFA and a lot more. And while this is very important, there is an area that we sometimes neglect. The office physical security, and this could lead to bypassing the firewalls, and hooking into the local network directly.

Recently GT ...
30.05.23 10:30 AM - Comment(s)
BIG-IP iControl REST vulnerability (CVE-2022-1388)
BIG-IP iControl REST vulnerability (CVE-2022-1388)
10.05.22 11:28 AM - Comment(s)
CONTI Ransomware Leak
An insight into how CONTI the ransomware organization in a strange stroke of irony, have had their data leaked online, and what we need to know about them.
01.03.22 01:20 PM - Comment(s)

Invoicing fraud is growing at an alarming rate. It occurs when a customer is fraudulently led to believe that a payment needs to be made for goods or a service into the wrong account.

This is done by duping the customer (victim) to change bank details on their system. This can be done telephonically ...

02.04.20 08:12 PM - Comment(s)

What is phishing?

Phishing is any fraudulent attempt to obtain confidential information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in electronic communication.

PHaaS (Phishing as a Service) allows organizations to determine a baseline for susceptibility...

22.10.19 04:12 PM - Comment(s)

Tags