Ananya Chatterjee

Ananya Chatterjee

61 followers

Keeping You Informed. Keeping You Aware. Stay on top of the latest in security including social engineering, ransomware and phishing attacks.

How contact forms can be exploited to conduct large-scale phishing activity?
[Heads Up] New Phishing Threat Infographic: Your Users Are Failing Security and HR-Related Attacks
[๐‡๐„๐€๐ƒ๐’ ๐”๐] ๐‹๐ข๐ฏ๐ž ๐๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐€๐ญ๐ญ๐š๐œ๐ค ๐”๐ฌ๐ž๐ฌ ๐๐ž๐ฐ ๐ˆ๐ง๐Ÿ๐ž๐œ๐ญ๐ข๐จ๐ง ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž ๐ญ๐จ ๐ƒ๐ž๐ฅ๐ข๐ฏ๐ž๐ซ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž
What is a honeypot? How it can lure cyberattackers
Testing All SSL Vulnerabilities With TestSSL Script
Simple Logical Bug Turned into a Bounty