Cyber Security Articles & News

What is Penetration Testing?

A penetration test is a simulated cyber attack against your nonmalicious computer system to check for exploitable vulnerabilities. It’s a series of targeted nonmalicious attacks, intended to breach your cybersecurity defenses. The difference between a pentest and a real attack, however, is that penetration tests are conducted by ethical security professionals, who keep any extracted data private and ultimately help you improve your security posture. 

Read More >
The Tech Kevin Mitnick Uses for Virtual Events & Webinars

When it comes to cybersecurity training, there’s no arguing that Kevin Mitnick has a notable name for himself. But he’s known for more than just his sold-out in-person conferences— he’s also earning credibility for his online live hacking demonstrations. 

Read More »
The Most Popular Cyber Attack: Social Engineering

Cybercriminals exploit numerous vulnerabilities when attempting to break into a network. Did you know that the most readily exploitable vulnerabilities are your employees or even yourself? 

Read More »
What is Computer Forensics and How Is It Used In Investigations?

If you have watched enough crime shows on television, you've likely seen an actor or actress portraying a forensic investigator. On shows like CSI: Miami, the forensic investigators seem to be able to type a few keys into a terminal and boom— they have all the information they need. 

Read More »
9 Ways Pentesters Breach Mac Security Defenses

There’s a notion that Apple products are unhackable, but no device truly is. While they aren’t as easy to breach as other devices, Macbooks, iPads, iPhones and other Apple devices are compromised by bad actors just like other operating systems.

In this post, we’re revealing nine ways penetration testers often find a way into Mac-based corporate environments to help you strengthen your defenses. If pentesters can do it, so can hackers. Let’s explore some of the top ways Macs are hacked:

Read More »
The Top Hacking Techniques All CISOs Should Educate Remote Users About

There’s no arguing that 2020 was a challenging year for an overwhelming number of industries across the United States. The COVID-19 pandemic forced many companies to explore new business models, both in product and service offering and in the internal structure of operations.

Read More »
What is ATT&CK and How Can It Protect Your Business from Cyber Threats

In the cybersecurity community, there always seems to be a new acronym to learn. ATT&CK, however, has been a well-respected model that many professionals have stood behind for years.

Read More »
An Overview of the 2020 Garmin Ransomware Attack

Last week, Garmin users experienced an outage in service as the result of a malicious cyber attack.

Let’s review the incident, looking at what the hackers did and how Garmin handled the situation to glean valuable lessons from the incident.

Read More »
Lessons from Penetration Testing: 7 Real-World Findings

The internet today is swarming with cybercriminals just waiting for the right opportunity to gain a foothold into your organization's network. One of the best ways to stay ahead is to find your organization's weak spots before cyber criminals do. 

Read More »
4 Lessons Learned from the Top Data Breach Lawsuits & Class Action Settlements

It’s always news when corporations have security breaches. This is especially true whenever malicious hackers gain access into a company’s internal databases to steal information— such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. Often, these data breaches can lead to lawsuits and other legal action against the victim company. 

Read More »