Cyber Security Articles & News

Kevin Mitnick Awarded Lifetime Achievement Award

Kevin Mitnick has posthumously been awarded the 2023 SANS Institute Lifetime Achievement Award, adding another incredible accomplishment to his life. 

Read More >
What is a Red Hat Hacker?

Cyber attackers shouldn’t all be painted with the same brush. There are many different types, all with separate motivations and some with specific tactics for hacking. While white and black hat hackers are the most common, a red hat hacker’s approach is interesting and unique. 

Read More »
Common Hacking Techniques in 2023 and Predictions for 2024

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at the expense of your business. In fact, in 2023, cyber attacks are estimated to amount to $8 trillion in total costs.

Read More »
The True Cost of a Data Breach: What You Need To Know

Data breaches are one of the most dangerous security incidents a company can experience, leaving affected organizations with negative repercussions that last well beyond the remediation period. With data breaches on the rise, it’s vital to ensure your enterprise’s network is fortified to protect against these catastrophic attacks.

Read More »
Remembering the World’s Greatest Hacker: Kevin Mitnick's Legacy

Arguably the most influential hacker, Kevin Mitnick, leaves behind a tremendous legacy and industry-changing knowledge in the hacking community as well as Mitnick Security and our team of security consultants.

Read More »
Understanding the Scope of A Penetration Test

Penetration testing puts your security systems to the test so you can see if your security framework can withstand a cyber attack.

Read More »
PCI Testing: Everything You Need To Know

Penetration testing is crucial for businesses to help ensure that their security posture will stand against threat actors. For businesses that handle credit and debit card information, keeping data secure is all the more important, as the financial services industry was the second-highest-targeted sector by hackers in 2022.

Read More »
The 4 Phases of Penetration Testing

So, you’ve done your research on penetration testing and are ready for the pentest engagement. But before you choose just any pentesting vendor, it’s vital that you understand the ins and outs of a penetration test engagement, including its four main phases.

Read More »
What is Web Application Penetration Testing?

Is your company in the process of developing a new application? There are a lot of moving parts involved in developing and deploying cutting-edge applications, whether they are internal apps designed for employee use or external, public-facing apps. 

Read More »
Before Choosing a Penetration Testing Company, Ask These 5 Questions

Whether your organization has been the victim of a recent data breach or has never had expert penetration testing done before, it’s probably time to call in cybersecurity experts. The right cybersecurity company can help you identify the strengths and weaknesses of your networks and systems so you can improve your security posture and stay ahead of threat actors. 

Read More »