Tag

Phishing

Explore in-depth articles about phishing attacks, including email phishing, spear phishing, smishing, and vishing. Learn how attackers craft deceptive messages, steal credentials, and compromise systems — and discover proven strategies to detect and block these threats.

posts

Spoofing Caller

Spoofing Caller Attacks: How Criminals Fake Trust

In March 2024, the FBI's Internet Crime Complaint Center reported that Americans lost over $10 billion to cybercrime in 2023 — and a staggering portion of those losses started with a single phone call from a number the victim trusted. A spoofing caller doesn't need to hack

Carl B. Johnson Aug 19, 2024 7 min read
Spoofing

What Is Spoofing? The Attack Behind Most Breaches

In January 2024, a finance employee at engineering firm Arup wired $25 million to criminals after a video call with what appeared to be the company's CFO and several colleagues. Every person on that call was a deepfake. The attackers had spoofed not just an email address or

Carl B. Johnson Aug 19, 2024 8 min read
Phishing

Define Phishing: What It Really Looks Like in 2024

In January 2024, a finance employee at a multinational firm in Hong Kong transferred $25.6 million to criminals after attending a deepfake video call where every other "participant" — including the CFO — was an AI-generated impersonation. That single incident redefines what phishing looks like today. If you still

Carl B. Johnson Jul 16, 2024 7 min read
Fake Identity Website

Fake Identity Website Threats: How to Spot and Stop Them

The Fake Identity Website That Fooled an Entire HR Department Earlier this year, an HR team at a mid-size logistics company received a job application that checked every box. The resume was polished, the LinkedIn profile looked legitimate, and the applicant's personal website — showcasing a portfolio and professional

Carl B. Johnson Jul 16, 2024 7 min read
Social Engineering Examples

Social Engineering Examples: 7 Real Attacks That Worked

In September 2023, a teenager used a phone call to trick an MGM Resorts employee into resetting credentials. That single social engineering attack cost MGM an estimated $100 million. No malware exploit. No zero-day vulnerability. Just a convincing voice on the other end of a help desk line. If you

Carl B. Johnson Apr 08, 2024 7 min read
Ransomware

What Is Ransomware? A Security Pro's Blunt Guide

In September 2023, MGM Resorts watched its slot machines go dark, hotel room keys stop working, and reservation systems crash — all because a threat actor social-engineered the company's help desk with a ten-minute phone call. The attackers deployed ransomware that cost MGM an estimated $100 million in lost

Carl B. Johnson Feb 28, 2024 6 min read
Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In September 2023, MGM Resorts lost an estimated $100 million after a social engineering phone call — just one phone call — gave threat actors the foothold they needed to deploy ransomware across the company's entire infrastructure. Slot machines went dark. Hotel key cards stopped working. Reservation systems collapsed. All

Carl B. Johnson Feb 09, 2024 7 min read
Data Breach

What Causes a Data Breach: 7 Root Causes Behind Every Attack

In September 2023, MGM Resorts International lost an estimated $100 million after a threat actor social-engineered a help desk employee with a single phone call. One conversation. That's all it took to cripple slot machines, hotel check-in systems, and digital room keys across Las Vegas for over a

Carl B. Johnson Jan 22, 2024 7 min read
Cyber Hygiene

What Is Cyber Hygiene? The Daily Habits That Stop Breaches

In March 2023, the FBI's Internet Crime Complaint Center reported that Americans lost over $10.3 billion to cybercrime in 2022 — a 49% increase from 2021. The majority of those losses didn't come from sophisticated nation-state attacks. They came from poor habits: reused passwords, unpatched software,

Carl B. Johnson Jun 08, 2023 7 min read