The Top 5 Most Famous Social Engineering Attacks of the Last Decade
There’s something both humbling and terrifying about watching industry giants like Twitter and Target fall victim to cyber attacks.
Read More >There’s something both humbling and terrifying about watching industry giants like Twitter and Target fall victim to cyber attacks.
Read More >Imagine two types of events: the company Christmas party and the quarterly mandated security awareness training.
We can guess which one you are looking forward to the most. We have all attended our fair share of impersonal or unexciting corporate events. But while teaching employees about cyber threats is crucial in maintaining a healthy security posture, keeping employees' attention during these events can be challenging.
Many companies seem to struggle when blending the enjoyment of a get-together, such as a celebration, with the educational aspect of a training or company meeting.
Read More »Most companies tell their employees to be on the lookout for email scams, yet not all take the time to educate their team on what these malicious messages look like.
Read More »This past weekend, the Fortune 500 hospital and healthcare services provider Universal Health Services (UHS) fell victim to an immobilizing ransomware attack.
Read More »A penetration test is a simulated cyber attack against your nonmalicious computer system to check for exploitable vulnerabilities. It’s a series of targeted nonmalicious attacks, intended to breach your cybersecurity defenses. The difference between a pentest and a real attack, however, is that penetration tests are conducted by ethical security professionals, who keep any extracted data private and ultimately help you improve your security posture.
Read More »When it comes to cybersecurity training, there’s no arguing that Kevin Mitnick has a notable name for himself. But he’s known for more than just his sold-out in-person conferences— he’s also earning credibility for his online live hacking demonstrations.
Read More »Cybercriminals exploit numerous vulnerabilities when attempting to break into a network. Did you know that the most readily exploitable vulnerabilities are your employees or even yourself?
Read More »If you have watched enough crime shows on television, you've likely seen an actor or actress portraying a forensic investigator. On shows like CSI: Miami, the forensic investigators seem to be able to type a few keys into a terminal and boom— they have all the information they need.
Read More »There’s a notion that Apple products are unhackable, but no device truly is. While they aren’t as easy to breach as other devices, Macbooks, iPads, iPhones and other Apple devices are compromised by bad actors just like other operating systems.
In this post, we’re revealing nine ways penetration testers often find a way into Mac-based corporate environments to help you strengthen your defenses. If pentesters can do it, so can hackers. Let’s explore some of the top ways Macs are hacked:
Read More »There’s no arguing that 2020 was a challenging year for an overwhelming number of industries across the United States. The COVID-19 pandemic forced many companies to explore new business models, both in product and service offering and in the internal structure of operations.
Read More »© Copyright 2004 - 2025 Mitnick Security Consulting LLC. All rights Reserved. | Privacy Policy