Blog
The Different Players in Social Engineering
The Different Players in Social Engineering People want to trust other people. This mindset means that social engineering can occur with negative consequences for the target. This post looks at the elements of social engineering in circumstances where there is a...
Three Ways You Can Unknowingly Get Hacked
Three Ways You Can Unknowingly Get Hacked Email, text messaging, and phone calls are common and known vectors for attacks. Nowadays, humans engage with each other through countless channels. In certain situations, people might drop their guard and do activities that...
A Vishing Scam Explored
A Vishing Scam Explored Author: Bill Bowman is Director of Marketing, North America at Cipher Phishing is the term for fooling someone into giving sensitive information or credentials via email. This blog, and many others, have written on the topic extensively. Scams...
Cipher Podcast: Breaking Down the 2020 Supply Chain Compromise
Cipher Podcast: Breaking Down the 2020 Supply Chain Compromise Our final podcast episode of the year looks at the immense cyber attack that took place recently. SolarWinds software was hacked, which led to government and private organizations being breached. We look...
Secure Your Git Directory
Secure Coding Tip Using Git Author: Lucas Davis is Red Team Senior Analyst at Cipher Developers use special tools to track the versions of code and then publish the code to production. Git is a popular program for accomplishing this. According to its website, "Git is...
Two Ways to Hack the Supply Chain
Two Ways to Hack the Supply Chain The combination of holiday shopping and a vaccine for COVID-19 have illustrated the importance of supply chains like never before. Goods get to market through supply chains. This post will look at two ways the different elements of a...
Healthcare Cybersecurity Webinar: Don’t Become a Headline!
Healthcare Cybersecurity Webinar: Don't Become a Headline! 2020 has brought attention to the healthcare sector like never before. The pandemic has placed immense strain on the system. Threat actors have taken advantage and launched headline-grabbing cyber attacks....
Stop Black Friday Scammers
Stop Black Friday Scammers The holiday shopping season is here. The Friday after Thanksgiving is known as Black Friday, where retailers roll out deep discounts. In years past, this day meant hordes of early-birds lining up to run into the store. The pandemic and the...
A Discussion About Business Email Compromise
A Discussion About Business Email Compromise Cipher's Bill Bowman and Scott Croskey chat with FireEye's Jamie Maxfield about how hackers perpetrate business email compromise and what companies can do to stop it.Get started being more secure with Cipher and FireEye by...