Cyber Security Articles & News

9 Ways Pentesters Breach Mac Security Defenses

There’s a notion that Apple products are unhackable, but no device truly is. While they aren’t as easy to breach as other devices, Macbooks, iPads, iPhones and other Apple devices are compromised by bad actors just like other operating systems.

In this post, we’re revealing nine ways penetration testers often find a way into Mac-based corporate environments to help you strengthen your defenses. If pentesters can do it, so can hackers. Let’s explore some of the top ways Macs are hacked:

Read More >
The Top Hacking Techniques All CISOs Should Educate Remote Users About

There’s no arguing that 2020 was a challenging year for an overwhelming number of industries across the United States. The COVID-19 pandemic forced many companies to explore new business models, both in product and service offering and in the internal structure of operations.

Read More »
Educate Your Remote Users about Cybersecurity with these Tips

With more companies switching to remote operations in light of COVID-19, bad actors are taking advantage of some gaps in businesses’ normal security posture. From pandemic-related phishing emails to malicious SMS messages, hackers are targeting your organization’s weakest link: security-uneducated employees working in less digitally safe home environments.

Read More »
What is ATT&CK and How Can It Protect Your Business from Cyber Threats

In the cybersecurity community, there always seems to be a new acronym to learn. ATT&CK, however, has been a well-respected model that many professionals have stood behind for years.

Read More »
An Overview of the 2020 Garmin Ransomware Attack

Last week, Garmin users experienced an outage in service as the result of a malicious cyber attack.

Let’s review the incident, looking at what the hackers did and how Garmin handled the situation to glean valuable lessons from the incident.

Read More »
Lessons from Penetration Testing: 7 Real-World Findings

The internet today is swarming with cybercriminals just waiting for the right opportunity to gain a foothold into your organization's network. One of the best ways to stay ahead is to find your organization's weak spots before cyber criminals do. 

Read More »
4 Lessons Learned from the Top Data Breach Lawsuits & Class Action Settlements

It’s always news when corporations have security breaches. This is especially true whenever malicious hackers gain access into a company’s internal databases to steal information— such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations or intellectual property. Often, these data breaches can lead to lawsuits and other legal action against the victim company. 

Read More »
The 2020 Twitter Bitcoin Scam: How it Happened and Key Lessons from Whitehat Hacker Kevin Mitnick

Just yesterday, the notable social media platform Twitter and a number of its high-profile users fell victim to a flashy Bitcoin scam. 

Read More »
8 Password Security Tips from Kevin Mitnick for Better Login Protection

When is the last time you truly considered your password strength and security? While password cracks don’t make the news quite as often as other breaches, they can compromise your systems all-the-same.

Read More »
Penetration Testing vs. Vulnerability Assessments: The Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »