- Adahi Cybersecurity
- Posts
- š” PhaaS - Phishing-as-a-Service; RaaS - Ransomware-as-a-Service
š” PhaaS - Phishing-as-a-Service; RaaS - Ransomware-as-a-Service
Social Engineering and the Constantly Evolving Cyber Threat Landscape
Hafa adai Net Defenders š”ļø
estimated read time: 3 minutes
Welcome to the exclusive adahi.tech private list, where we decode cybersecurity jargon, so you could sound smarter in front of our colleagues and bosses alike!

šø PhaaSSS is such a vibe, fam.
That is so RaaSSS, chief, no cap. It sounds like terms the cool Gen-z kids are saying these days. Unfortunately, we canāt just shake our heads and say ai adai, these kids nowadays. Social engineering just got a bit more complex, and we need to keep up with the times. Phishing-as-a-Service and Ransomware-as-a-Service is a threat CISOās all over the world are paying close attention to. In the cybersecurity curve, this is emerging to be the next evolution of Social Engineering.
Ransomware-as-a-Service (RaaS)
RaaS is where criminals create, host, and sell ransomware to other criminals in the dark web. This means that even individuals with limited technical knowledge can launch sophisticated ransomware attacks. RaaS has significantly lowered the barriers of entry for cybercriminals, making it easier for them to target organizations like yours.
Phishing-as-a-Service
PaaS is another Cybercrime-as-a-Service trend that allows criminals to purchase phishing campaigns targeting specific organizations or individuals. These campaigns typically involve sending fraudulent emails that appear to be from legitimate sources, tricking recipients into reveling sensitive information or downloading malicious software.
š Staying Ahead of Emerging Threats
As the threat landscape of cybersecurity constantly evolves, it's critical to stay ahead of the curve and take proactive steps to protect yourself and your organization from emerging threats. Keep these in mind when building out your cybersecurity strategy.
Educate your employees Talk about it at work: 80% of cybercrime can be traced back to human error. This is a direct attack on your users to gain access to your systems.
Regularly Update Software: Keep all software and systems up-to-date with the latest patches and security updates.
Implement a robust data backup and recovery plan: have them in multiple secure locations, test the process, and encrypt your backups files
Update your security policies: each organization is different, and the landscape is evolving. Review regularly with IT, Execs, and Ops.
Stay Informed: refer this newsletter to your coworkers so you can discuss these ideas together. Two minds are better than one.
Remember, cybersecurity is a shared responsibility, and it's up to all of us to stay vigilant and take proactive steps to protect ourselves and our organizations. By following these proactive steps, an organization can reduce their risk of a successful cyber attack.
This newsletter is brought to you by:
A cybersecurity company headquartered in Guam, U.S.A., building resiliency on the island through our community of Net Defenders and the services we provide:
š”ļø Penetration testing and vulnerability assessment services
{Adahi Tech Red Team}
Perform an authorized simulated cyberattack on a computer system to identify vulnerabilities and evaluate the effectiveness of security measures. The outcome is a report detailing vulnerabilities found and recommended actions to improve security.
Training for Federal Contractors, IT Departments, Business Professionals, and End-users
š”ļø CMMC Compliance Awareness - Building Secure Supply Chains (1 day)
This workshop is designed for individuals working in organizations that handle Controlled Unclassified Information (CUI) or Defense Industrial Base (DIB) contracts. This is training for: Information Security Professionals, Compliance Officers, Project Managers, System Administrators, IT Auditors, Procurement Officers.
š”ļø CyberSec First Responder {Blue Team} - for IT Professionals (5 days)
CFRās play a critical role in securing their organizationās information, business processes, and intellectual property. They have demonstrated expertise in networking, operating systems, application security, or cloud environments, and their role is to identify, protect, detect, respond, and recover from cybersecurity incidents for their organizations.
š”ļø IRBIZ Incident Response {Purple Team} - for Business Professionals (1 day)
Designed primarily for business professionals - IT, and non-technical leaders, plus any additional personnel who are responsible for creating, governing, or complying with incident response policies and regulations
š”ļø CyberSafe training and certification (1 day)
Help ensure that your end users can identify the common risks associated with using conventional end-user technology, as well as how to safely protect themselves and their organizations from security risks.
For more information, contact us at [email protected]
The ideas in this weekās newsletter came from a friend who forwarded an article about a kidās hospital getting hit by ransomware. The hacker group apologized and claimed that they sold the service to another criminal. The hacker groupās ātechnical support teamā proceeded with helping them decrypt the locked files. (links to the story below)
With these tools and services out there, organization are urged to update the way they think about cybersecurity. I hope these insights help you with discussions throughout your organization. Thanks for your feedback.
[teenager voice]
Stay vibing, fam, donāt have cringe security policyyyy,
- Jeff
SickKids is aware of a statement from a ransomware group offering a decryptor to restore systems impacted by the cybersecurity incident on December 18. Read more: sickkids.ca/en/news/archivā¦
ā SickKids_TheHospital (@SickKidsNews)
11:20 PM ⢠Jan 1, 2023

Have you been forwarded this from a colleague?
Sign up to the adahi.tech private list to receive weekly actionable insights from the ever changing world of cybersecurity.
We keep your feedback private. Unsubscribe anytime.