Think it’s twisted to use sick children to lure unsuspecting people to provide their credit card information to donate? You bet! Think tactics like this are beyond the schemes of an attacker who will go to any length to steal sensitive data? Never.
How one “hotel guest” gained access to the entire network from a network switch found inside their linen closet during a physical penetration test.
How we got into a heavily guarded research facility and took ownership of the network during a physical pen test. You would think that a business whose business is defense intelligence and cyber security would have an impenetrable network, right? We recently conducted a penetration test for a client that proved how simple it was… Read more »
Tips for a fast recovery after a ransomware attack, and how to mitigate the impact of such an attack with improved data backup.
How We Compromised a Major Corporate Network During a Physical Pen Test Here’s a “pro tip” for any company out there using armed guards to protect their facility: If you’re not properly segmenting your network, those armed guards can’t do anything to stop an attacker from compromising your company’s private data. We recently conducted a… Read more »
During this time of heightened cybersecurity threats, we are offering free cybersecurity services (one per customer): Phishing Preparedness Analysis and Remote Access Policy Assessments. Phishing Preparedness Analysis: As organizations shift to this new work from home paradigm, attackers are taking advantage and expanding their already effective phishing campaigns. For a limited time, we will perform… Read more »
Free Cybersecurity to Combat Threats Posed by COVID-19 Don’t miss an event that could be putting your organization’s security at risk. During this time of heightened cybersecurity threats, we are offering a FREE 30-day trial of ThreatAdvisor. Built on the knowledge of security consultants and penetration testers with more than 50 years of experience in… Read more »
Significant Volume of Brute Force Attempts Against Ingress Authentication Sources In the past 72 hours there has been a significant volume of brute force attempts against various ingress authentication sources (like o365 or VPN solutions). We have seen this across all of our customers and that this activity is both typical for this time of… Read more »
Can you believe it’s already October? We have to wait until the 31st to celebrate Halloween, but October 1st kicked off “National Cyber Security Awareness Month (NCSAM)”. National Cyber Security Alliance, in partnership with the Department of Homeland Security, runs this annual campaign in an effort to “engage and educate public and private sector partners… Read more »
So in Part 1, we covered solutions for preventing hacking attempts, as they are considered one of the top two reasons for successful security breaches. In this article, we will cover some common sense approaches to preventing and identifying malware breaches. The Problem: So one of the questions we pose to our audience in our… Read more »