An Overview of the 2021 Twitch Live Streaming Data Breach
Online video gamers everywhere had their eyes and ears on the news, curious to learn more about their popular live streaming service Twitch and its recent data breach.
Read More >Online video gamers everywhere had their eyes and ears on the news, curious to learn more about their popular live streaming service Twitch and its recent data breach.
Read More >Every October, people all across the U.S. celebrate a month full of cybersecurity awareness and education.
Read More »Cybercriminals everywhere are demanding thousands to millions of dollars to unlock the technology they’ve attacked and compromised. This type of malware attack earned itself the name ransomware for the high ransoms bad actors require to release devices, applications, or data.
Read More »With each passing year, cyber attacks are becoming more and more rampant. But since 2020, one type of virtual attack has been hitting the news more than others: ransomware.
Read More »Social engineering is not a new concept; in fact, it was said to have originated in 1184 BC with the legendary tale of the Trojan Horse. But since the evolution of technology, we've come a long way from hiding in wooden horses…
Read More »Ransomware attacks have been flooding the news over the last few years— and in this past year especially.
Read More »If you are looking to book a cyber security speaker, there’s a strong chance you are considering a digital broadcast. After all, the COVID-19 pandemic has made it nearly impossible for event planners to host in-person events.
Read More »So, you've decided to run a penetration test against your organization. But now... what do you do with the results?
With so many vulnerabilities exposed, where should you even start? As a matter of fact, how do you even read this technical report?
Read More »Is your company in the process of developing a new application? Whether it’s an internal app intended for employee use or a public-facing external web app, there’s a lot of work that goes into creating and rolling out a cutting-edge application.
In fact, your company may invest hundreds or thousands of hours designing and developing this new application— so it’s no wonder that once it’s ready for launch, you want to immediately use it.
Read More »You’ve been told you need social engineering training, but as soon as you start researching what social engineering is, you’re hit with all these confusing terms and abbreviations.
Read More »© Copyright 2004 - 2023 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy