<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.lifutechnologies.co.za/blogs/tag/phishing/feed" rel="self" type="application/rss+xml"/><title>Lifu Technologies - Blog #phishing</title><description>Lifu Technologies - Blog #phishing</description><link>https://www.lifutechnologies.co.za/blogs/tag/phishing</link><lastBuildDate>Thu, 16 Apr 2026 13:32:03 -0700</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[Cost and frequency of a data breach by initial attack vector]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Cost-and-frequency-of-a-data-breach-by-intial-attack-vector</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Cost and frequency of a data breach by intial attack vector.png"/>Cost and frequency of a data breach by intial attack vector - IBM Cost of a Data Breach Report 2024]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Ouz_HoDmROKyeE4pYPoHYA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_LbyHoCuOQwmrXONYviXpag" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_ykwhic4STwSBgmNTJcAJhg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ixrTqP5cQlucDlpYTfRyPg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Don’t let a data breach disrupt your business </span></h2></div>
<div data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_omA_4Y-yh9EJV0GaTESRmQ"] .zpimagetext-container figure img { width: 919px !important ; height: 516px !important ; } } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-original zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Cost%20and%20frequency%20of%20a%20data%20breach%20by%20intial%20attack%20vector.png" size="original" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><p>Interesting to see which attack vectors are the most successful. Talk to us about how our Prevent &amp; Protect solution can minimize the risk in these attack vectors or read about it here:&nbsp;</p><p><span style="color:rgb(129, 129, 129);"><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Zafepass Prevent &amp; Protect" rel="">Zafepass Prevent &amp; Protect</a></span><a href="https://www.lifutechnologies.co.za/blogs/post/zafepass-prevent-protect-nist-data-science-8v-s-cis-18-controls-mitre-att-ck-kill-chain" title="Read about Prevent and Protect" rel=""><span style="color:rgb(129, 129, 129);"><br></span></a></p><p></p><p></p></div>
</div></div><div data-element-id="elm_OLUPwc97TNu68O9YeJfMCQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;">Be prepared for breaches by understanding how they happen and learning about&nbsp;the factors that increase or reduce your costs. New research from IBM and&nbsp;Ponemon Institute provides insights from the experiences of 604 organizations and&nbsp;3,556 cybersecurity and business leaders hit by a breach. Empower yourself with&nbsp;real-world examples and expert recommendations on how to mitigate the risks.</span></p></div>
</div><div data-element-id="elm_b2EXBarqRXOTlBzGtdktfg" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.ibm.com/reports/data-breach" title="Link to the download site"><span class="zpbutton-content">Register with IBM for a copy of the full report</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 02 Aug 2024 10:13:07 +0200</pubDate></item><item><title><![CDATA[Fakebook: How Attackers Use Social Media Impersonation to Scam Bank Customers]]></title><link>https://www.lifutechnologies.co.za/blogs/post/Fakebook</link><description><![CDATA[<img align="left" hspace="5" src="https://www.lifutechnologies.co.za/Images/Fakebook logo.png"/>While social media impersonation is old news to security teams, BlueVoyant cyber threat analysts have identified an advanced campaign targeting banking customers using a new method: spoofed customer service accounts.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zOKdOazhRb-o48tsJq2Dog" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Iy5ECe7zRKe9cWzpeAecXQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_aJASnZlFT7adBXjwe-ErlQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_mEy76RKiR42J978hj4_hzg" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_mEy76RKiR42J978hj4_hzg"].zpelem-heading { border-radius:1px; } </style><h2
 class="zpheading zpheading-align-center " data-editor="true"><span style="color:inherit;">Deep dive into the characteristics, scope, and tactics the attackers used to deploy this sophisticated campaign. </span></h2></div>
<div data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width: 789px !important ; height: 260px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } @media (max-width: 767px) { [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"] .zpimage-container figure img { width:789px ; height:260px ; } } [data-element-id="elm_oS1NiYV6Y4Qqg2OUY2Ec6A"].zpelem-image { border-radius:1px; } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-size-original zpimage-tablet-fallback-original zpimage-mobile-fallback-original hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Images/Fakebook%20-%20Tactics.png" width="789" height="260" loading="lazy" size="original" data-lightbox="true"/></picture></span></figure></div>
</div><div data-element-id="elm_VwC35bb3RNiwX2UytXDCRw" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_VwC35bb3RNiwX2UytXDCRw"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><div style="color:inherit;"><p><strong>Download now to learn:</strong></p><p>How threat actors are able to set up spoofed accounts and target customers</p><p>The methods they use to gain access to sensitive data, like bank account numbers, and dupe users into providing their payment card information or a direct deposit</p><p>Best practices for remediation and recommendations for preventing this type of scam</p></div><p></p></div>
</div><div data-element-id="elm_4-466IAxQhO9pJWiYbgtuA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_4-466IAxQhO9pJWiYbgtuA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="/files/HowAttackersUseSocialMediaImpersonationReport.pdf" download><span class="zpbutton-content">Download</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Mon, 08 May 2023 22:32:39 +0200</pubDate></item></channel></rss>