social engineering

Payroll Pirates Reveal Canada’s Human Risk Gap

On April 9, 2026, Microsoft’s security researchers published their investigation into Storm-2755, a financially motivated threat actor running what they are calling “payroll pirate” attacks against Canadian employees. The campaign does not rely on malware, ransomware, or headline-grabbing intrusions. It relies on two things that are already inside your organization: a staff member who Googled […]

Payroll Pirates Reveal Canada’s Human Risk Gap Read More »

When Teams Is the Trap: Rethinking Phishing Prevention

The attack unfolded through tools that would look routine to any working professional: a LinkedIn connection from a credible-seeming contact, an invitation to a Slack workspace that appeared genuinely company-branded, and then a Microsoft Teams video call that stalled with a familiar-looking technical error. The suggested fix was a software update. One developer clicked, and

When Teams Is the Trap: Rethinking Phishing Prevention Read More »

ClickFix: The Fake CAPTCHA That’s Tricking Employees

A social engineering technique called ClickFix is now the leading way cybercriminals break into organizations, and it asks nothing more from victims than pressing three keys on a keyboard. According to Microsoft’s 2025 Digital Defense Report, ClickFix has become the number one initial access method, responsible for 47% of all attacks observed by Microsoft Defender

ClickFix: The Fake CAPTCHA That’s Tricking Employees Read More »

When the Boss Calls: AI Voice Scams Target Employees

AI voice scam employee training is no longer a future concern for Canadian organizations. On March 9, 2026, Canada’s Competition Bureau issued a public alert warning that scammers are using artificial intelligence to impersonate government officials, politicians, and other trusted figures with a level of realism that makes these calls remarkably difficult to detect. The

When the Boss Calls: AI Voice Scams Target Employees Read More »