Cyber Security Articles & News

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: your employees. Social engineering has evolved over the years as threat actors deploy new methods of fooling their targets — untrained employees — into granting access to the inner workings of your organization. 

Read More >
Pros and Cons of Manual vs Automated Penetration Testing

Although threat actors are constantly utilizing new tradecraft and tools to pose a real threat against organizations, cybersecurity experts — including white hat hackers — stand against these threats with innovative techniques and tools of their own. Penetration testing is one such tool used to find the weaknesses in an organization’s cybersecurity measures. These cyber-attack simulations can either be done by software (automated penetration testing) or by cybersecurity experts known as pentesters (manual penetration testing). 

Read More »
Cyber Security Risks of Remote Employee Offboarding

Remote work options are popular trends that provide flexibility for the employee and potentially a less expensive option for the employer. However, remote work devices can pose a real threat to your organization, especially after recent layoffs or organizational restructuring. We’ll explore the potential vulnerabilities caused by unprotected devices as well as data breach prevention techniques to keep your organization’s private data secure.

Read More »
5 Examples of Top Social Engineering Attacks

There’s something both humbling and terrifying about watching industry giants like Twitter and Uber fall victim to cyber attacks.

Read More »
Password Spraying Attacks: Technique and Prevention

Many organizations have cyber security measures in place to prevent threat actors from breaching defenses and launching their attacks. However, there may be a gaping hole in your organization’s security: untrained employees. 

Read More »
Understanding the Main Types of Penetration Testing

You may have heard about penetration testing, and have decided to dig a bit deeper to see if this cybersecurity testing can help your organization against threat actors — suddenly you’re lost in a jungle of jargon, asking yourself some confusion questions: 

Read More »
4 Signs Your Organization Needs Red Team Penetration Testing

According to a recent poll conducted by PwC, executives believe that mandated disclosures, tests of resilience, and pressure to get data security and privacy right will be their biggest challenges for 2023.

Read More »
2023 Cybersecurity Budget Considerations for Your Organization

With the use of multiple work platforms and applications, organizations must choose between spending on cybersecurity or being vulnerable to devastating hacking techniques. One common roadblock is that companies don’t budget for the right cybersecurity measures. International Business Times states that “it’s now imperative that companies have cybersecurity in place to stop hackers from interfering with their data.” 

Read More »
Why Choose Mitnick Security for Your Penetration Testing Services?

Incorporating cybersecurity services as part of your organization’s security plan can help stop threat actors in their tracks. From cyber security awareness training to Red Team engagements, Mitnick Security offers a wide range of services designed to strengthen the security posture of businesses of all sizes. 

Read More »
5 Common Remote Work Security Threats

Although it may be standard company policy for your employees to stay alert and proactive when using your organization’s protected internal network and systems, it can be difficult to maintain this same level of cybersecurity awareness when it comes to remote workers. According to Upwork, it's expected that 73% of all work teams will have remote workers by 2028. 

Read More »