Business Email Compromise (BEC)

Business Email Compromise (BEC)

Title Company Falls Prey to Business Email Compromise (BEC)Responding to Sophisticated Phishing AttacksProblemA title company – through its normal course of business – performs millions of dollars in financial transactions every year via wire transfers. After several...
After-Hours Ransomware

After-Hours Ransomware

After-Hours Ransomware Infects All Network-Based Servers Responding to Cyber Threats to Keep Business Running As Usual Problem A US-based industrial construction company experienced a severe after-hours network outage that crippled the entire business operations,...
Email Spoofing

Email Spoofing

BOGUS TAX RETURNS AS RESULT OF EMAIL PHISHING Protecting Cloud-Based Programs from Phishing Scams Problem An employee at a small CPA firm in Houston received an email asking for their Office365 credentials. The email appeared to be from Microsoft, so the employee...

But Really, What is Ransomware?

Discover the past, present, and possible future of this costly cybersecurity trend. Everyone has heard the term “ransomware” and knows that it’s definitely not a good thing. But do you really know what ransomware is? Quick Explanation Ransomware is malicious software...

What to Do When a Ransomware Attack Occurs?

Start defining how to handle major aspects of a cyber incident response plan. The worst has happened – you discovered your machine, or even your entire network, has been infected with ransomware. Now what? Everyone hopes their defenses will properly protect them, but...

Can You Complete our Virtual Escape Room?

Work with your team to solve puzzles and escape the virtual Pathway Forensics office. Are you looking for a fun way to connect with your team while working from different locations? Do you wish you could complete challenges that might not have anything to do with your...