Cyber Security Articles & News

6 Questions to Ask Before Beginning Red Team Pentesting

If you’ve conducted a few successful penetration tests already, you may be wondering, “what’s next?”

Read More >
What You Get When You Invest in Social Engineering Testing with Mitnick Security

You’ve educated your team on the dangers of cybercriminals by putting them through social engineering training. 

But was the investment worth it? Did your employees actually learn how to recognize a phishing email, how to craft and use stronger passwords and how to better protect your systems?

Read More »
How to Prepare for Penetration Testing

Whether you’re conducting your organization’s very first penetration test or are simply getting your assets in order, it’s smart to understand everything that goes into preparing for the engagement.

Read More »
What You Get When You Invest in Mitnick Red Team Pentesting

Now that you’ve got a few concentrated penetration tests under your belt, you’re ready to put your newly enhanced security to the test. And boy, are we up for the challenge.

Read More »
What is a Red Team Pentesting?

If your company has invested in many penetration tests, you’re probably looking for more advanced ways of examining your security infrastructure. 

Read More »
An Inside Look Into Kevin Mitnick's Live Hacking Demonstrations

To be frank, a lot of cyber security presentations are, well… dull. 

Read More »
An Overview of the 2021 JBS Meat Supplier Ransomware Attack

Over the last weekend of May 2021, the world's largest meat supplier became a victim of a malicious cyber attack. 

Read More »
Social Engineering Training: What You're Really Paying For

Social engineering attacks are currently one of the most prominent cyberattacks plaguing organizations today. While many corporations try to implement state-of-the-art software to prevent this type of threat, the most crucial safeguard is often overlooked... End users, who are the first and last line of defense when it comes to social engineering attacks. 

Read More »
4 Social Engineering Attack Examples (with Pictures!)

We’re constantly telling our employees to look out for social engineering attacks, but while we can share definitions all day long, humans often learn best by example.

Read More »
What is a Ransomware Attack?

It’s a normal work day— that is, until you receive an intriguing email from your boss asking you why an invoice was improperly paid. In the message, they seem angry, demanding to know why you approved this high-dollar transaction.

Read More »