Acquire
SPF DKIM DMARC - What, why and how?

SPF DKIM DMARC - What, why and how?

SPF DKIM DMARC - What, why and how?

SPF, DKIM and DMARC: why are they important and how can you set them up?

What are SPF, DKIM and DMARC? How do they contribute to setting up protection against phishing attacks and how can you set them up for your company domain?

Mantra Team
Best Practices

Most popular

More reads

Phishing attacks: SMishing

Phishing attacks: SMishing

Phishing attacks: SMishing

Hacking

What is SMishing (SMS phishing)?

What is SMishing (SMS phishing) and how do hackers conduct these attacks?

Mantra Team
Comparison - ISO 27001 and SOC2

Comparison - ISO 27001 and SOC2

Comparison - ISO 27001 and SOC2

Cybersecurity

ISO 27001 and SOC2: which standard should you choose?

What are the differences between the ISO 2007 and SOC2 standards? And which one is right for your company?

Mantra Team
PDF for malware delivery

PDF for malware delivery

PDF for malware delivery

Hacking

Can a PDF infect your computer?

A quick look at how hackers can exploit the PDF format to deliver malware.

Mantra Team
Conditional Access: how hackers can pass Microsoft Azure AD's protection

Conditional Access: how hackers can pass Microsoft Azure AD's protection

Conditional Access: how hackers can pass Microsoft Azure AD's protection

Hacking

How hackers bypass Microsoft Azure AD Conditional Access

Microsoft Azure AD's Conditional Access is a great tool! But hackers have found ways around it. Here's how.

Mantra Team
Overview of phishing attacks

Overview of phishing attacks

Overview of phishing attacks

Cybersecurity

Phishing, spear-phishing, smishing, vishing, whaling... a quick guide

A bit lost navigating all the different kinds of phishing cyberattacks? Here's a quick guide to give you an overview of each: phishing, spear-phishing, whaling, smishing, vishing.

Mantra Team
Social Engineering and Phishing Attacks

Social Engineering and Phishing Attacks

Social Engineering and Phishing Attacks

Hacking

How do hackers use social engineering in their phishing attacks?

What is social engineering? How do hackers use this tactic in their phishing and spear-phishing attacks?

Mantra Team
Business Email Compromise (BEC) Definition & Tips

Business Email Compromise (BEC) Definition & Tips

Business Email Compromise (BEC) Definition & Tips

Cybersecurity

What is Business Email Compromise (BEC) and how to avoid falling for it?

What is a Businesss Email Compromise cyberattack? How do hackers run these types of attacks and how can you protect your company from them?

Mantra Team
OSINT, hackers and phishing

OSINT, hackers and phishing

OSINT, hackers and phishing

Hacking

How hackers use OSINT for their phishing attacks

What is OSINT (Open Source INtelligence) and how do hackers use it for their phishing attacks?

Mantra Team
What's the right frequency and timing for your phishing simulation campaigns?

What's the right frequency and timing for your phishing simulation campaigns?

What's the right frequency and timing for your phishing simulation campaigns?

Best Practices

Phishing Simulations: Frequency and Timing are key

What is the right frequency and timing of your phishing simulation campaigns to make them the most effective? Mantra's data team has a look at this issue.

Mantra Team
Icon

Suscribe to our newsletter

All the content you need to stay up to date on the latest cyber security trends
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.