Cyber Security Articles & News

Is ChatGPT Considered a Cybersecurity Threat?

Chatbots have been known to provide many helpful benefits for companies and their customer support departments for several years. Chatbots are programs created to create realistic and helpful conversations with others, which is why they’ve been used by customer support departments to streamline and automate certain customer-facing tasks.

Read More >
Breach and Attack Simulation vs Red Team Pentesting

Cyberattacks have posed a significant threat to organizations across the world, creating an urgency to take the necessary measures to shore up your network security to prevent catastrophic damage to your business.

Read More »
What To Expect When You Get a Vulnerability Assessment From Mitnick Security

Since threat actors are constantly developing new tools and techniques for infiltrating an organization’s defenses, effective cybersecurity can never be a “set it and forget it” mentality. It’s true that vulnerability scans and other software tools are important to your organization’s security posture — but you also need a team of cyber security experts on your side to keep up with cyber criminals. Below, we’ll discuss the value of an expert eye and what you can expect with a vulnerability assessment from Mitnick Security.

Read More »
What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration testing more than once, look no further than the pentest report for your answer. Below, we’ll discuss what’s included in a penetration testing report and why this information is crucial to shoring up your organization’s cybersecurity.

Read More »
What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their limits and find new ways to infiltrate cybersecurity defenses and steal or exploit private data — potentially costing organizations billions of dollars in damages. But how do threat actors do it? Pivoting is the name of the technique that many threat actors would consider their number one weapon. 

Read More »
What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: your employees. Social engineering has evolved over the years as threat actors deploy new methods of fooling their targets — untrained employees — into granting access to the inner workings of your organization. 

Read More »
Pros and Cons of Manual vs Automated Penetration Testing

Although threat actors are constantly utilizing new tradecraft and tools to pose a real threat against organizations, cybersecurity experts — including white hat hackers — stand against these threats with innovative techniques and tools of their own. Penetration testing is one such tool used to find the weaknesses in an organization’s cybersecurity measures. These cyber-attack simulations can either be done by software (automated penetration testing) or by cybersecurity experts known as pentesters (manual penetration testing). 

Read More »
Cyber Security Risks of Remote Employee Offboarding

Remote work options are popular trends that provide flexibility for the employee and potentially a less expensive option for the employer. However, remote work devices can pose a real threat to your organization, especially after recent layoffs or organizational restructuring. We’ll explore the potential vulnerabilities caused by unprotected devices as well as data breach prevention techniques to keep your organization’s private data secure.

Read More »
5 Examples of Top Social Engineering Attacks

There’s something both humbling and terrifying about watching industry giants like Twitter and Uber fall victim to cyber attacks.

Read More »
Password Spraying Attacks: Technique and Prevention

Many organizations have cyber security measures in place to prevent threat actors from breaching defenses and launching their attacks. However, there may be a gaping hole in your organization’s security: untrained employees. 

Read More »