Cyber Security Articles & News

The Growth of Ransomware Attacks

“Ransomware” is a buzzword that’s undoubtedly been splashed all across the news in the past two years. The cyberattack gets its name for the financial ransom victims are asked to pay to unlock their system after being infected by malware. 

Read More >
4 Reasons to Invest in Product Claims Testing with Mitnick Security

When we talk to customers who have worked with other vendors, we hear the same complaints across the board:

Read More »
Top Techniques Used by Social Engineers

Social engineers use new techniques daily to gain unauthorized access to private systems and servers. But while new tactics are ever-arising, many “tried and true” techniques remain consistent. After all, when something works, why change it?

Read More »
Lessons Learned From GoDaddy's 2021 Data Breach

The American internet domain registrar and web hosting company GoDaddy recently made the news for the latest 2021 security breach. 

Read More »
How Social Engineering Can Affect an Organization

Organizations around the world are enrolled in security awareness training programs and taught to look out for cybercriminals who are using a hacking technique called social engineering

Read More »
5 Questions to Ask Before Conducting a Pentest

Getting ready for a pentest might seem overwhelming, no matter if it’s your first or your fourth. 

Read More »
Who is REvil? The Notorious Ransomware Hacking Group, Explained

Over the last two years, the internet has been riddled with ransomware attacks wherein cybercriminals compromise technology or data, make it inaccessible via encryption, and demand their victim pay a ransom to recover it. 

Read More »
Understanding the Growth of Software Supply Chain Cyber Attacks

The past two years have been a particularly active time for cybercriminals. People across the world have seen the headlines featuring sliding banners covering digital attack after attack. 

Read More »
What is the Difference Between Blackbox, Greybox & Whitebox Pentesting?

When we speak of black, grey, and whiteboxes, we are not talking about the color of the PC on a desktop once called beige box. We are speaking of the amount of access a pentester has been given before attempting to breach a system or network. 

Read More »
What Are the Different Types of Hackers?

Hackers make the news regularly for their ever-evolving exploits on major brands and small businesses alike. 

Read More »