social engineering attack
- 
	
	In the world of manufacturing and distribution, trust is the backbone of every transaction. Vendors, partners, and logistics providers operate in a rhythm... Read blog
- 
	
	Security researchers have raised concerns about the recent emergence of FlowerStorm, a potential evolution of the Rockstar 2FA exploit service. While the demise... Read blog
- 
	
	Received an important document from HR? Proceed with caution. Of recent, threat actors frequently succeeded with emails impersonating HR departments. Once an unfortunate... Read blog
- 
	
	There are plenty of social engineering attacks that can dupe your most internet-savvy employees into accidentally giving up valuable data and access to... Read blog
- 
	IT 101 – Social Engineering Attacks12/06/19Welcome to IT 101, where the experts at 2W Tech will tackle a hot topic in the IT industry and break it down... Read blog