Cyber Security Articles & News

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks. 

Read More >
What You Get When You Invest in Social Engineering Testing with Mitnick Security

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer. This means testing that directly simulates a threat actor’s processes and attack patterns.

Read More »
Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result in the loss of thousands of dollars for your business, a breach in your data, potential damage to your reputation, and loss of customers. 

Read More »
Mitnick Security: Phishing Awareness Training

Phishing emails are one of the most common social engineering techniques used by threat actors today due to such high success rates. About 3.4 billion phishing emails are sent every day, having cost victims worldwide roughly $50 billion in losses according to the FBI. With this in mind, it’s important you and your team have the proper training in place to recognize and report a phishing email in order to avoid compromising your network, data, business, and reputation. 

Read More »
Mitnick Security Training: QR Code Cybersecurity Test

Nearly 90 million smartphone users in the U.S. alone have used QR codes on their mobile devices. By 2025, that number is projected to grow to 100 million. As people have become more comfortable using QR codes, threat actors have begun using them to find yet another way to steal credentials and access sensitive information.

Read More »
Celebrating National Social Engineering Day

August 6th, 2024, marks the first annual National Social Engineering Day, an opportunity to raise awareness about social engineering threats and emphasize effective cybersecurity practices. 

Read More »
The Growth of Third-Party Software Supply Chain Cyber Attacks

In the past several years, we've seen an uptick in cyber threat activity. In fact, many cyber-espionage groups, such as Dragonfly, are becoming especially bold when attacking an organization’s weakest links: their third-party supply chains.  

Read More »
Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read More »
How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the next step is.

Read More »
Understanding Post-Inoculation Cybersecurity Attack Vectors

If you’ve recently improved your cybersecurity posture, you should know that the work to protect your company’s data is not over.

Read More »