AI-Generated Videos Are More Realistic Than Ever!
In this blog, we detail 9 techniques that anyone can follow to determine whether a video is AI-generated or is showing real people and events.
By reading articles published by the CanIPhish team.
In this blog, we detail 9 techniques that anyone can follow to determine whether a video is AI-generated or is showing real people and events.
In this blog, we detail 12 tips that anyone can follow to avoid becoming victim to a LinkedIn scam. If you're looking to use LinkedIn to find new jobs, interact with peers, or keep up with the latest tends, this is a must read!
In this blog, we detail 12 tips that anyone can follow to avoid becoming victim to a facebook marketplace scam. If you're looking to use facebook marketplace, this is a must read!
In this blog, we dive into the various types of phishing payloads you might receive. We outline what they do, why they're dangerous, and how to protect yourself against them.
We've carefully curated a list of 13 tips that will help you become an expert hacker in 2024! Each tip can be followed independently and will help you develop both the technical and non-technical skills needed to become a well-rounded hacker.
We've curated a list of the 15 most popular cyber security and hacking podcasts! These podcasts are across a range of sub-categories and are bound to peak your interest.
As AI becomes more effective, its use-cases become more robust and widespread. One downside of this, is the growing effectiveness of AI-driven scams.
In this blog, we walk through the step-by-step process of how any organization, big or small, can create a secure SPF record that's hardened in-line with industry best practices.
In this blog, we walk through the step-by-step process of how Generative AI technologies can be used to fully automate conversational phishing attacks.
In this blog, we provide a detailed walkthrough of the various techniques that can be used to prevent phishing attacks. We outline their effectiveness, difficulty to implement, and cost, allowing you to prioritise your approach.
In this blog, we provide a detailed walkthrough that any MSP can use to create a managed security awareness training service.
In this blog, we walk through the capabilities every MSP should look for when partnering with a training software provider.
The team at CanIPhish has meticulously collated and researched the 25 best movies that outline the potential power of artificial intelligence! If you want to expand your perception of what's possible, look no further!
In this blog, we showcase some of the funniest technology memes you'll ever see. If you're looking for some laughs, then this is the blog for you!
In this blog, we outline what social engineering is, how it's performed, and how you can protect against it. The best way to defend yourself is to understand how these attacks are performed!
In this blog, we outline what human risk management is, why it's important, and what's needed to build your own human risk management program.
In this blog, we walk through the steps any business can follow to train and empower their employees to be cyber secure.
In this blog, we outline what the dark web is, how you can monitor it, and why monitoring is a necessity for cybersecurity teams.
In this blog, we showcase the different techniques you can use to make a password that's not only uncrackable, but also memorable! This is a must read for 2024.
In this blog, we learn all about the different types of security awareness training and how various factors play into what training should be assigned to employees.
In this blog, we're delving into the 40 best hacking movies to watch in 2024. Many of these movies are cult classics, but some have just been released!
Learn about all the different techniques you can use to instill a positive and collaborative culture of cyber awareness in your business!
In this blog, we deep-dive into all facets of what a phishing link is. We explore how they're sent, what happens if you click one, and what you can do to recover afterwards.
In this blog, we deep-dive into the features, differentiators, and backstory of different training providers.
In this blog, we look at the good, the bad, and the funny sides of cyber security! We've done this by creating a curated list of the 25 most relatable cyber security memes.
In this blog, we detail the step-by-step process of discovering vulnerable domains, setting up the necessary infrastructure, and sending emails with spoofed sender addresses.
In this blog, we’ll outline what security awareness training programs are, why they're important, and how you can follow 8 simple best practices to guarantee the success of your program!
In this blog we'll outline what phishing tests are, why they're important, how you can run them and the strengths and weaknesses of using various tools and approaches.
In this blog we outline the 5 reasons why responding to phishing attacks is a bad idea.
If you have happened to respond to a phishing email, we also outline a number of steps you can take to protect yourself.
The team at CanIPhish has done a detailed analysis of the new DPDP Act to understand the implications on our customers.
Read this blog to understand what the DPDP act is, how it affects you, and what the penalties are for non-compliance.
The team at CanIPhish have curated a list of the funniest phishing memes we've come across in 2024.
Take a look and share these with your team members to have a laugh.
Let's walkthrough the SOC 2 assessment process and outline when, where, and why phishing simulations are needed.
In this blog you'll learn all you need to know on the best practices of employee phishing training.
In this blog you'll learn about the process of ensuring the right phishing email is crafted for the right victim.
In this blog you'll learn how cyber-attacks occur, how much they cost, and what you can do to prevent them.
The team at CanIPhish did a market analysis of the various types of security awareness training providers and their pricing model.
Curious what you can do to run truly realistic and effective phishing awareness training? In this blog we outline a series of ideas, tactics and techniques you can use.
Learn how the team at CanIPhish clone websites for the purposes of running simulated phishing campaigns.
In this blog we discuss why you should start running periodic phishing simulations to train employees.
We deep-dive into concepts such as the benefits of phishing simulations, the capabilities needed, the impact on enterprise security, the benefits of periodic training, and much more...
Delivering SPF authenticated emails on behalf of the Ukrainian Ministry of Defence and 1000+ others.
Understand why and how your company can educate employees on phishing
An analysis of how phishing is so successful, how attacker do it and how difficult it is.
An analysis of recent data breaches and how they impact the phishing trends of cyber criminals.
And finding 1.62 Million SPF & DMARC email security issues, including 542 domains that have authorised any IP address to send emails from their domain.
Concerned you might be getting targeted with phishing attacks? Learn how to spot and act on phishing attacks.
Can popularity be used to infer functional maturity? Take a look at the hard statistics collected by CanIPhish.
What's more effective at protecting your business? Phishing awareness training or Secure Email Gateways?
An analysis of insurance modelling and how to lower your premiums.
Some of Australia's most respected institutions have email supply chains vulnerable to IP takeover attacks.
What does an IT Managed Service Provider and 190 of its customers have in common? A compromised email supply chain.
When CanIPhish launched, we hit a roadblock... Our phishing websites and domains kept getting blocklisted by Google Safe Browsing.
Ever wondered if you could automatically evaulate a single phish against every popular email spam & malware filter?
Ever wished you could bypass spam & malware filters to guarantee delivery of your spear-phishing email?
You're likely broadcasting sensitive information through the default Postmaster Non-Delivery Report (NDR).
Malicious Office Macros have progressively become one of the most dominant malware delivery vectors.
Phishing campaigns often utilise a variety of email spoofing techniques to trick users.