Cyber Security Articles & News

Spear Phishing vs Phishing: Recognizing the Difference

Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of people and the organizations they serve. Although there are many types of cyber attacks, phishing accounts for around 25% of all data breaches. 

Read More >
Kevin Mitnick Security Awareness Training: Microsoft Teams

Kevin Mitnick — founder of Mitnick Security and KnowBe4’s Chief Hacking Officer — helps organizations find and remediate vulnerabilities through penetration testing to avoid cybersecurity incidents. However, that isn’t the whole story. 

Read More »
World Famous Computer Hackers and What They're Doing Now

We can agree that one thing all hackers share is curiosity, but not all hackers are the same. There are different types of hackers. For example, black hat hackers (threat actors) exploit network vulnerabilities and attempt to make a profit to the detriment of businesses. These are the “bad guys” of the hacking world.

Read More »
Vulnerability Assessment vs Penetration Testing: Key Differences

While similar in some ways, the often interchangeably used vulnerability assessments and penetration tests are two different beasts. Throw vulnerability scans into the mix and, suddenly, most companies are confused.

Read More »
Uber Data Breach: What To Know About the 2022 Cybersecurity Attack

No matter how robust network security is, even the biggest companies fall victim to cyber attacks. These malicious attacks can be costly — to the tune of 4.3 million on average — but they also disrupt operations and hurt a company’s reputation. 

Read More »
How Bots Can Be Used in Social Engineering Attacks

People are social and want to help others whenever possible but doing so in a digital work environment can allow bad actors to deceive unsuspecting individuals into providing access to sensitive information. When threat actors manipulate one of your employees into performing an action or giving information — the definition of social engineering — your entire organization could be at risk. 

Read More »
Dive Inside the Mind of a Hacker in Kevin Mitnick’s Book, The Art of Deception

Kevin Mitnick, founder of Mitnick Security, is known worldwide for his part in transforming the information security industry into what it is today. It’s hard to imagine that it all started with a kid who had unsupervised free time and an insatiable curiosity for magic tricks and the budding tech industry — but it did. Kevin grew up learning that tricking people in the form of social engineering and cybersecurity hacking was not only fun, it earned him attention and respect. 

Read More »
What Is a Social Engineering Attack — The Basics

Social engineering is one of the most popular techniques used in cybercrime today. In fact, Firewall Times reports that, “98% of cyber attacks involve some form of social engineering.” Why is social engineering effective against even the most secure organizations? It’s simple. Social engineering tactics take advantage of our inherent kindness and trusting nature to benefit the people-savvy hacker — the social engineer. 

Read More »
10 Reasons Why Your Organization Needs Penetration Testing

Suffering a data breach can be one of the most financially devastating events to happen to your organization — period. According to CNET, the data breach of T-Mobile in July of 2021 will cost the company $350 million dollars in payouts. 

Read More »
3 Results From Your Penetration Testing Report That May Surprise You

There are several steps you can take to protect your organization from threat actors, but how do you know if your cybersecurity posture is strong enough? Penetration testing — a simulated cyber attack performed by experts — is crucial when it comes to assessing your network’s vulnerabilities. 

Read More »