Tag

Network Security

Covers strategies, tools, and best practices for protecting computer networks from unauthorized access, cyberattacks, and data breaches. Topics include firewalls, intrusion detection systems, network segmentation, and monitoring techniques that help organizations maintain secure and resilient infrastructure.

posts

Spoofing

Spoofing Attacks: How Hackers Impersonate You

A CFO, a Spoofed Email, and a $37 Million Wire Transfer In 2024, the FBI's Internet Crime Complaint Center (IC3) continued reporting staggering losses from business email compromise — a category where spoofing is the engine that makes the scam work. Threat actors forge sender addresses, manipulate caller IDs,

Carl B. Johnson Jun 18, 2019 8 min read
Spoofing

Spoof Attacks: How Threat Actors Trick Your Defenses

The CEO Email That Cost a Company $47 Million In 2015, Ubiquiti Networks disclosed that attackers impersonating company executives via spoofed emails tricked employees into wiring $46.7 million to overseas accounts. The emails looked legitimate. The sender addresses appeared correct. No malware was involved. The entire attack hinged on

Carl B. Johnson Jun 18, 2019 7 min read
Spoofing

What Is Spoofing? The Attack Behind Most Breaches

In 2023, the FBI's Internet Crime Complaint Center received over 298,000 complaints related to phishing and spoofing — making it the number one reported cybercrime category for the fifth year running. That wasn't a fluke. Spoofing is the backbone of almost every major social engineering campaign

Carl B. Johnson Apr 01, 2019 7 min read