Cyber Security Bulletin: Patterns and Trending Topics

The key to a successful phishing attack is to make the email appear authentic. As targets have now become more wary of unsolicited emails, sophisticated scammers have begun to exploit patterns and trending topics to fake authenticity in their attacks.

Patterns

The use of EDMs, or Electronic Direct Mails, is a standard way via which…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store