Cyber Security Articles & News

What is a Red Team Pentesting?

If your company has invested in many penetration tests, you’re probably looking for more advanced ways of examining your security infrastructure. 

Read More >
An Inside Look Into Kevin Mitnick's Live Hacking Demonstrations

To be frank, a lot of cyber security presentations are, well… dull. 

Read More »
An Overview of the 2021 JBS Meat Supplier Ransomware Attack

Over the last weekend of May 2021, the world's largest meat supplier became a victim of a malicious cyber attack. 

Read More »
Social Engineering Training: What You're Really Paying For

Social engineering attacks are currently one of the most prominent cyberattacks plaguing organizations today. While many corporations try to implement state-of-the-art software to prevent this type of threat, the most crucial safeguard is often overlooked... End users, who are the first and last line of defense when it comes to social engineering attacks. 

Read More »
4 Social Engineering Attack Examples (with Pictures!)

We’re constantly telling our employees to look out for social engineering attacks, but while we can share definitions all day long, humans often learn best by example.

Read More »
What is a Ransomware Attack?

It’s a normal work day— that is, until you receive an intriguing email from your boss asking you why an invoice was improperly paid. In the message, they seem angry, demanding to know why you approved this high-dollar transaction.

Read More »
6 Types of Social Engineering Attacks

Social engineering attacks account for a massive portion of all cyber attacks, and studies show that these attacks are on the rise. According to KnowBe4, more than 90% of successful hacks and data breaches start with a common type of social engineering attack called phishing.  

Read More »
Decoding Pentesting Report Lingo: The Ultimate Glossary

You know that penetration tests are important to run— and that more and more companies are integrating them into their annual cybersecurity initiatives.

Read More »
What is Multi-Factor Authentication & How Does it Work?

It seems that everything we use these days requires a password. From email and social media accounts to everything in between, we always need a password to gain access. 

But it isn't as simple as just coming up with one password and using it for everything. At least, it would be best if you weren't doing that...

Read More »
How Social Engineers Use Your Digital Footprint Against You

Think of all the publicly accessible information about your business that’s published on the web— from your corporate social media accounts to your very own website. 

Read More »