Enthec participates in FEINDEF, the International Defence and Security Exhibition

Madrid, 17th, 18th and 19th May 2023:

Enthec participates in FEINDEF, the International Defence and Security Fair, a reference forum for the defence and security sector in Spain, invited by INCIBE in the Innova for Def&Sec Space.

 


Qué es el phishing

Phishing: What Is It and How Many Types Are There

In this article, we will continue discussing one of the most common types of cyberattack: phishing. Phishing is a set of techniques that aim to deceive a victim and gain their confidence by impersonating a trusted person, company, or service (impersonation of a trusted third party). The impersonator is called a phisher. The goal is to manipulate the victim and make them perform actions they should not perform (revealing confidential information or clicking on a link).

 

Types of phishing

Types of phishing

Email phishing

Most of these phishing messages are sent via spam. They are not personalized or targeted at a specific person or company; their content varies depending on the phisher’s target. Common phishing targets include banks and financial services, email and cloud productivity providers, and streaming services.

Voice phishing

Voice phishing is the use of the telephone to carry out attacks. Attackers use VoIP (Voice over IP) technology to make numerous fraudulent calls cheaply or free of charge to obtain codes, passwords, or bank details from the victim, who is often unsuspecting

SMS phishing

Smishing is a form of phishing in which mobile phones are used as the attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via an SMS message—the criminal attacks in an attempt to obtain personal information, including credit card or social security numbers.

Page hijacking

It is achieved by creating an illegitimate copy of a popular website where visitors are redirected to another website when they log on.

Calendar phishing

Calendar phishing is when phishing links are delivered via calendar invitations. Calendar invitations are sent that, by default, are automatically added to many calendars.

 

Kartos by Enthec helps you locate active phishing campaigns

Kartos Corporate Threat Watchbots is the monitoring and cyber surveillance platform developed by Enthec for the protection of organizations. Among its capabilities, the real-time location of active phishing campaigns with the usurpation of corporate identity and their monitoring until they are entirely deactivated stand out. Contact us for more information on how Kartos can help you protect your organization against phishing and other threats.

 


las tres capas de la web

The Three Layers of the Web: Internet, Dark Web and Deep Web

This article will discuss the Internet, the Deep Web, and the Dark Web and the content found in each. These are commonly referred to as the three layers of the Web or the three levels of the Web.

 

Internet

The Internet is a web-like network of interconnected computers worldwide. It consists of servers that provide information to millions of people who are connected through telephone and cable networks. Its origins date back to 1969, when the first computer connection, known as ARPANET, was established between three universities in California (United States).
One of the most successful services on the Internet has been the World Wide Web (WWW or the Web), to such an extent that confusion between the two terms is common. The WWW is a set of protocols that allows, in a simple way, the remote consultation of hypertext files.

 

Internet layer of the Web

 

The Deep Web

The Deep Web is part of the World Wide Web and cannot be found on common search engines like Google. The part that is available to everybody is called the Surface Web. The first person to use the term “Deep Web” was Mike Bergman, a computer scientist, in 2000.
The Deep Web is not the same as darknet or the Dark Web, though they could quickly appear to have the same meaning.
Accessing the deep web does not require unique protocols; that is the main difference.

 

The Dark Web

This term refers to content that search engines do not index, requiring authorization or special software to access. It is all that deliberately hidden content that we find on the Internet.
A darknet is a private or closed computer network. The Dark Web comprises independent networks (specific networks such as TOR or IP2).
The Dark Web is a part of the World Wide Web located on the darknets. To access it, you must know a password and use specific software. It can only be accessed through the Tor or IP2 browser. The encrypted nature of the browser means that anyone trying to access the dark web remains anonymous by default.
Google or any other search website cannot find a darknet. The Dark Web exists within the Deep Web but is not an equivalent network.

 

Kartos crawls the three layers of the Web to locate vulnerabilities in your organization

Kartos Corporate Threat Watchbots is the Continuous Threat Exposure Management (CTEM) solution developed by Enthec to protect organizations. Through its army of bots, Kartos crawls the Internet, the Deep Web and the Dark Web to locate exposed vulnerabilities and open corporate breaches that are public and for sale and that can be used to engineer a cyberattack against the organization. Kartos works continuously, automated, autonomous and in real time. It does not require implementation in the organization's IT system and issues alarms in real time about the vulnerabilities and threats it finds. Contact us to receive more information on how Kartos can help you neutralize ongoing threats against your organization.


Media presence: TiC Cybersecurity

Read the full story

https://ciberseguridadtic.es/entrevistas/enthec-las-companias-estan-mucho-mas-abiertas-de-lo-que-ellas-mismas-pueden-suponer-202304031651.htm