Cyber Security Articles & News

Understanding the Growth of Software Supply Chain Cyber Attacks

The past two years have been a particularly active time for cybercriminals. People across the world have seen the headlines featuring sliding banners covering digital attack after attack. 

Read More >
What is the Difference Between Blackbox, Greybox & Whitebox Pentesting?

When we speak of black, grey, and whiteboxes, we are not talking about the color of the PC on a desktop once called beige box. We are speaking of the amount of access a pentester has been given before attempting to breach a system or network. 

Read More »
What Are the Different Types of Hackers?

Hackers make the news regularly for their ever-evolving exploits on major brands and small businesses alike. 

Read More »
An Overview of the 2021 Twitch Live Streaming Data Breach

Online video gamers everywhere had their eyes and ears on the news, curious to learn more about their popular live streaming service Twitch and its recent data breach. 

Read More »
Everything You Need to Know About National Cyber Security Awareness Month

Every October, people all across the U.S. celebrate a month full of cybersecurity awareness and education. 

Read More »
The Top 5 Most Famous Ransomware Attacks

Cybercriminals everywhere are demanding thousands to millions of dollars to unlock the technology they’ve attacked and compromised. This type of malware attack earned itself the name ransomware for the high ransoms bad actors require to release devices, applications, or data.

Read More »
The Top Industries Being Targeted in Ransomware Attacks

With each passing year, cyber attacks are becoming more and more rampant. But since 2020, one type of virtual attack has been hitting the news more than others: ransomware

Read More »
What is External Network Pentesting?

If your organization has conducted a penetration test in the past, it was likely one of six main types of pentests

Read More »
6 FAQs From CISOs About the Pentesting Process

As a Chief Information Security Officer (CISO), you have the responsibility of not only directing your organization’s security but also conveying your risk status to leadership.

Read More »
How Technology is Changing the Future of Social Engineering

Social engineering is not a new concept; in fact, it was said to have originated in 1184 BC with the legendary tale of the Trojan Horse. But since the evolution of technology, we've come a long way from hiding in wooden horses…

Read More »