Cyber Security Articles & News

Top Techniques Used by Social Engineers

Social engineers use new techniques daily to gain unauthorized access to private systems and servers. But while new tactics are ever-arising, many “tried and true” techniques remain consistent. After all, when something works, why change it?

Read More >
Lessons Learned From GoDaddy's 2021 Data Breach

The American internet domain registrar and web hosting company GoDaddy recently made the news for the latest 2021 security breach. 

Read More »
How Social Engineering Can Affect an Organization

Organizations around the world are enrolled in security awareness training programs and taught to look out for cybercriminals who are using a hacking technique called social engineering

Read More »
5 Questions to Ask Before Conducting a Pentest

Getting ready for a pentest might seem overwhelming, no matter if it’s your first or your fourth. 

Read More »
Who is REvil? The Notorious Ransomware Hacking Group, Explained

Over the last two years, the internet has been riddled with ransomware attacks wherein cybercriminals compromise technology or data, make it inaccessible via encryption, and demand their victim pay a ransom to recover it. 

Read More »
What is the Difference Between Blackbox, Greybox & Whitebox Pentesting?

When we speak of black, grey, and whiteboxes, we are not talking about the color of the PC on a desktop once called beige box. We are speaking of the amount of access a pentester has been given before attempting to breach a system or network. 

Read More »
What Are the Different Types of Hackers?

Hackers make the news regularly for their ever-evolving exploits on major brands and small businesses alike. 

Read More »
An Overview of the 2021 Twitch Live Streaming Data Breach

Online video gamers everywhere had their eyes and ears on the news, curious to learn more about their popular live streaming service Twitch and its recent data breach. 

Read More »
Everything You Need to Know About National Cyber Security Awareness Month

Every October, people all across the U.S. celebrate a month full of cybersecurity awareness and education. 

Read More »
The Top 5 Most Famous Ransomware Attacks

Cybercriminals everywhere are demanding thousands to millions of dollars to unlock the technology they’ve attacked and compromised. This type of malware attack earned itself the name ransomware for the high ransoms bad actors require to release devices, applications, or data.

Read More »