Phishing Simulation Training

Vendor-Email-Compromise

FAQ – Vendor Email Compromise, What Is It?

References: https://ironscales.com/glossary/vendor-email-compromise Vendor Email Compromise - How Does It Work? VEC usually starts with a malicious threat actor that gains access to a vendors email account. This is usually done…

Read more
5 warning signs of a phishing email

Signs To Watch Out For If You Suspect An Email To Be A Phishing Email

One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…

Read more