May 9, 2023

Are BEC attacks on the rise?
Are you at risk of a BEC (business email compromise) attack? How can you respond to this particularly insidious kind of email phishing? What are the most common techniques scammers use to fool employees with a BEC attack? Learn the ways that BEC hacks work on their victims and how to protect yourself and your business.

You may also be interested in:
News roundup Mon, May 8, 2023
Stories, news, politics and events impacting the network security industry during the last week.
- Flaw in WordPress plugin puts 2 million sites at risk
- Cisco discloses vulnerability in popular phone adapter, urges migrating to newer version
- Fleckpe malware discovered on Google Play store, downloaded 620K times
- Meta purges hundreds of accounts associated with cyber espionage campaigns
- Royal ransomware impacts city of Dallas IT services
- 9 crypto laundering exchanges seized by the FBI
- Apple’s Rapid Response security update system debuts
- CISA adds three new flaws to its Known Exploited Vulnerabilities catalog
- T-Mobile has been hacked for the second time this year
- Thousands of malware-making Play Store developer accounts banned by Google
- Russian hackers targeting Ukrainian government with malicious fake Windows update
- Read more
NetworkTigers is your source of new and refurbished Meraki switches, access points and firewalls, enterprise and small business firewalls, top-of-rack switches, corporate switches, high-speed routers, data center PDUs and transceivers for your business. Fast shipping worldwide. We save our clients millions of dollars by supplying high-quality used equipment.
Please get in touch to discuss your network or your security needs.
Send The NetworkTigers newsletter opt-in to others.
Michael Syiek
President | NetworkTigers
Direct: 415-537-6950 x241
Cell: 415-378-2851
Toll-free: 800-430-6950 x241
Skype: CiscoSniper
Signal: 415-378-2851
Email: mike@networktigers.com
