Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-03 13:48:06 |
The Growth of Third-Party Software Supply Chain Cyber Attacks (lien direct) |
|
Threat
|
|
★★★
|
|
2024-06-28 14:23:55 |
La croissance des cyberattaques de la chaîne d'approvisionnement des logiciels tiers The Growth of Third-Party Software Supply Chain Cyber Attacks (lien direct) |
|
Threat
|
|
★★★
|
|
2024-05-22 20:38:00 |
Comprendre les vecteurs d'attaque de cybersécurité post-inoculation Understanding Post-Inoculation Cybersecurity Attack Vectors (lien direct) |
|
|
|
★★
|
|
2024-05-21 13:37:26 |
Gestion des mots de passe meilleures pratiques: dans quelle mesure les gestionnaires de mots de passe sont-ils sécurisés? Password Management Best Practices: How Secure Are Password Managers? (lien direct) |
Les gestionnaires de mots de passe sont des outils pratiques pour stocker, organiser et accéder aux mots de passe.Mais sont-ils à l'abri des cyberattaques?
Password managers are convenient tools for storing, organizing, and accessing passwords. But are they safe from cyber attacks? |
Tool
|
|
★★
|
|
2024-05-13 13:56:24 |
Test de l'équipe rouge vs tests de pénétration Red Team Testing vs. Penetration Testing (lien direct) |
8 billions de dollars et, d'ici 2025, le coût total devrait atteindre 10,5 billions de dollars - Il est maintenant temps de prioriser les tests de cybersécurité pour votre organisation.
As the cost of cyber attacks continues to grow - in 2023, the worldwide cost of cyber attacks reached $8 trillion and, by 2025, the total cost is estimated to hit $10.5 trillion - now is the time to prioritize cybersecurity testing for your organization. |
|
|
★★
|
|
2024-05-06 14:31:18 |
Qu'est-ce que la récolte d'identification et comment les acteurs de la menace le réalisent-ils? What Is Credential Harvesting and How Do Threat Actors Pull It Off? (lien direct) |
79% Les comptes d'entreprise ont été compromis par les acteurs de la menace utilisant des tactiques de récolte d'identification, telles que le phishing des informations d'identification.
Credential harvesting, otherwise known as credential compromising or credential theft, can be a highly devastating cyber threat. It also happens to be very successful, as over 79% of business accounts were compromised by threat actors using credential harvesting tactics, such as credential phishing. |
Threat
|
|
★★
|
|
2024-04-08 13:32:41 |
Redéfinir votre posture de cybersécurité pendant les fusions et acquisitions Redefining Your Cyber Security Posture During Mergers & Acquisitions (lien direct) |
avec 3 205 compromis de données survenant en 2023 seuls , Fortifier la posture de cybersécurité de votre entreprise \\ est plus importante que jamais.
With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise\'s cybersecurity posture is more important than ever. |
|
|
★★
|
|
2024-04-04 13:19:05 |
Choisir une entreprise de test de pénétration pour les environnements basés sur Mac Choosing a Penetration Testing Company for Mac-based Environments (lien direct) |
|
Threat
|
|
★★
|
|
2024-03-26 18:18:31 |
IA dans la cybersécurité: impacts, avantages AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of (lien direct) |
|
|
|
★★
|
|
2024-02-22 15:37:32 |
Sécurité à distance: 5 conseils de cybersécurité pour les employés et les entreprises Remote Security: 5 Cyber Security Tips for Employees and Businesses (lien direct) |
par 2025, 32,6 millions d'Américains sont estimés à fonctionner à distance.De plus, 73% des cadres croient que les employés qui travaillent à distance présentent plus de risques de cybersécurité pour leurs organisations. & Nbsp;
By 2025, 32.6 million Americans are estimated to work remotely. Additionally, 73% of executives believe employees who work remotely present more cyber security risks to their organizations. |
|
|
★★
|
|
2024-02-12 14:57:54 |
Combien de temps faudra-t-il pour récupérer une violation de données? How Long Will It Take To Recoup From a Data Breach? (lien direct) |
|
Data Breach
|
|
★★★
|
|
2024-02-07 14:32:19 |
Attaques de ransomwares: tendances et industries la plupart ciblées Ransomware Attacks: Trends and Most Targeted Industries (lien direct) |
|
Ransomware
|
|
★★
|
|
2024-02-05 13:29:06 |
Nouveaux réglementations SEC concernant les violations de données New SEC Regulations Regarding Data Breaches (lien direct) |
|
Data Breach
Legislation
|
|
★★★
|
|
2024-01-11 15:06:20 |
Techniques de piratage courantes en 2023 et prédictions pour 2024 Common Hacking Techniques in 2023 and Predictions for 2024 (lien direct) |
|
Prediction
|
|
★★★
|
|
2024-01-03 14:28:36 |
Le véritable coût d'une violation de données: ce que vous devez savoir The True Cost of a Data Breach: What You Need To Know (lien direct) |
Les violations de données sont l'un des incidents de sécurité les plus dangereux qu'une entreprise puisse ressentir, laissant les organisations affectées avec des répercussions négatives qui durent bien au-delà de la période de correction.Avec violation de données surLa montée , il est essentiel de s'assurer que le réseau de votre entreprise est fortifié pour se protéger contre ces attaques catastrophiques.
Data breaches are one of the most dangerous security incidents a company can experience, leaving affected organizations with negative repercussions that last well beyond the remediation period. With data breaches on the rise, it\'s vital to ensure your enterprise\'s network is fortified to protect against these catastrophic attacks. |
Data Breach
|
|
★★
|
|
2023-10-23 13:42:52 |
Comprendre la portée d'un test de pénétration Understanding the Scope of A Penetration Test (lien direct) |
Les tests de pénétration mettent vos systèmes de sécurité au test afin que vous puissiez voir si votre cadre de sécurité peut résister à une cyberattaque.
Penetration testing puts your security systems to the test so you can see if your security framework can withstand a cyber attack. |
|
|
★★★
|
|
2023-07-19 13:34:40 |
Déception de l'utilisateur: les plus grands cisos des cybermenaces oublient User Deception: The Biggest Cyber Threat CISOs are Forgetting (lien direct) |
|
Threat
|
|
★★★
|
|
2023-06-27 13:25:28 |
Le processus de test de pénétration The Penetration Testing Process (lien direct) |
|
Data Breach
|
|
★★
|
|
2023-06-23 14:10:23 |
Test de pénétration de l'équipe rouge avec Mitnick: à quoi s'attendre Red Team Penetration Testing With Mitnick: What to Expect (lien direct) |
|
Data Breach
|
|
★★
|
|
2023-06-07 13:16:11 |
Test de pénétration de la cybersécurité pour les sociétés multinationales Cyber Security Penetration Testing for Multinational Corporations (lien direct) |
|
|
|
★★
|
|
2023-06-01 13:06:53 |
Tout ce que vous devez savoir sur le biscuit de mot de passe de Mitnick \\ Everything You Need To Know About Mitnick\\'s Password Cracker (lien direct) |
|
|
|
★★
|
|
2023-03-24 14:56:26 |
Violation et simulation d'attaque vs équipe rouge Pentest [Breach and Attack Simulation vs Red Team Pentesting] (lien direct) |
|
Threat
General Information
|
|
★★
|
|
2023-03-20 13:13:00 |
Vulnerability Assessment From Mitnick Security (lien direct) |
Since threat actors are constantly developing new tools and techniques for infiltrating an organization's defenses, effective cybersecurity can never be a “set it and forget it” mentality. It's true that vulnerability scans and other software tools are important to your organization's security posture - but you also need a team of cyber security experts on your side to keep up with cyber criminals. Below, we'll discuss the value of an expert eye and what you can expect with a vulnerability assessment from Mitnick Security. |
Threat
Vulnerability
|
|
★★
|
|
2023-03-14 12:56:37 |
Pivoting in Cyber Security (lien direct) |
Data breaches in 2022 were abundant and sophisticated. Realistically, it's expected that this year we will continue to see threat actors test their limits and find new ways to infiltrate cybersecurity defenses and steal or exploit private data - potentially costing organizations billions of dollars in damages. But how do threat actors do it? Pivoting is the name of the technique that many threat actors would consider their number one weapon. |
Threat
|
|
★★
|
|
2023-03-07 17:00:00 |
What Is One-time Password (OTP) Social Engineering? (lien direct) |
Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: your employees. Social engineering has evolved over the years as threat actors deploy new methods of fooling their targets - untrained employees - into granting access to the inner workings of your organization. |
Threat
Vulnerability
|
|
★★
|
|
2023-02-28 20:55:00 |
Cyber Security Risks of Remote Employee Offboarding (lien direct) |
Remote work options are popular trends that provide flexibility for the employee and potentially a less expensive option for the employer. However, remote work devices can pose a real threat to your organization, especially after recent layoffs or organizational restructuring. We'll explore the potential vulnerabilities caused by unprotected devices as well as data breach prevention techniques to keep your organization's private data secure. |
Threat
Data Breach
|
|
★★
|
|
2023-02-22 08:00:00 |
5 Examples of Top Social Engineering Attacks (lien direct) |
There's something both humbling and terrifying about watching industry giants like Twitter and Uber fall victim to cyber attacks. |
|
Uber
Uber
|
★★★
|
|
2023-02-06 16:04:00 |
Password Spraying Attacks: Technique and Prevention (lien direct) |
|
General Information
|
|
★★
|
|
2023-01-12 09:42:00 |
Why Choose Mitnick Security for Your Penetration Testing Services? (lien direct) |
Incorporating cybersecurity services as part of your organization's security plan can help stop threat actors in their tracks. From cyber security awareness training to Red Team engagements, Mitnick Security offers a wide range of services designed to strengthen the security posture of businesses of all sizes. |
Threat
|
|
★
|
|
2022-12-23 22:58:26 |
6 Types of Social Engineering Attacks (lien direct) |
Social engineering attacks account for a massive portion of all cyber attacks. Since COVID-19, these attacks are on the rise. More than 90% of successful hacks and data breaches start with social engineering. |
|
|
★★★
|
|
2022-12-22 21:19:00 |
4 Key Benefits of Multi-Factor Authentication (MFA) (lien direct) |
In today's world, using single-factor authentication (SFA) such as a lone password or a PIN number to access private data may no longer cut it. With the rise of cyber security threats - including an increasing number of ransomware attacks - it may be time to explore steps you can take to level up your organization's cybersecurity. |
Ransomware
|
|
★★
|
|
2022-12-05 20:39:00 |
Why Should You Invest in Kevin Mitnick\'s Security Awareness Training? (lien direct) |
Data breaches are one of the most common cyber security incidents that can cost companies millions, even trillions of dollars. |
|
|
★★
|
|
2022-11-23 15:57:25 |
Spear Phishing vs Phishing: Recognizing the Difference (lien direct) |
Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of people and the organizations they serve. Although there are many types of cyber attacks, phishing accounts for around 25% of all data breaches. |
Threat
|
|
|
|
2022-10-06 17:00:00 |
5 Questions To Ask When Evaluating a Penetration Testing Company (lien direct) |
Whether your organization has been the victim of a recent data breach or your organization has never had expert penetration testing done before, it's probably time to call in cybersecurity experts. The right cybersecurity company can help you identify the strengths and weaknesses of your networks and systems so you can improve the security posture of your organization and stay one step ahead of threat actors. |
Threat
Data Breach
|
|
|
|
2022-10-03 17:00:00 |
Uber Data Breach: What To Know About the 2022 Cybersecurity Attack (lien direct) |
No matter how robust network security is, even the biggest companies fall victim to cyber attacks. These malicious attacks can be costly - to the tune of 4.3 million on average - but they also disrupt operations and hurt a company's reputation. |
Data Breach
|
Uber
|
★★★
|
|
2022-09-12 17:30:00 |
What Is a Social Engineering Attack - The Basics (lien direct) |
Social engineering is one of the most popular techniques used in cybercrime today. In fact, Firewall Times reports that, “98% of cyber attacks involve some form of social engineering.” Why is social engineering effective against even the most secure organizations? It's simple. Social engineering tactics take advantage of our inherent kindness and trusting nature to benefit the people-savvy hacker - the social engineer. |
|
|
|
|
2022-09-06 21:14:00 |
10 Reasons Why Your Organization Needs Penetration Testing (lien direct) |
Suffering a data breach can be one of the most financially devastating events to happen to your organization - period. According to CNET, the data breach of T-Mobile in July of 2021 will cost the company $350 million dollars in payouts. |
Data Breach
|
|
★★★★★
|
|
2022-09-01 21:58:00 |
3 Results From Your Penetration Testing Report That May Surprise You (lien direct) |
There are several steps you can take to protect your organization from threat actors, but how do you know if your cybersecurity posture is strong enough? Penetration testing - a simulated cyber attack performed by experts - is crucial when it comes to assessing your network's vulnerabilities. |
Threat
|
|
|
|
2022-07-27 16:43:00 |
Entering the Metaverse for Your Virtual Cyber Security Events (lien direct) |
|
|
|
|
|
2022-07-21 17:13:00 |
The Most Common Social Engineering Techniques We\'re Seeing This Year (lien direct) |
With today's available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain system control of organizations. Not surprisingly, 98% of cyber attacks involve social engineering tactics. |
Threat
|
|
|
|
2022-06-30 20:00:00 |
4 Reasons Why Internal Network Penetration Testing Is Vital to Your Business (lien direct) |
Although vulnerability scans and assessments are crucial for maintaining a strong cybersecurity posture, penetration testing goes beyond the routine to thoroughly test your organization against potential security threats. There are 6 main types of penetration tests that can be performed: |
Vulnerability
|
|
|
|
2022-06-28 20:00:00 |
Kevin Mitnick\'s Best Hacking Demo - Explained (lien direct) |
Getting your team excited about protecting your assets can be a challenge, but it's possible with the right cybersecurity speaker. Kevin Mitnick, founder of Mitnick Security and considered the best hacker in the world, has revolutionized industry training standards one cybersecurity presentation and hacking demo at a time. |
|
|
|
|
2022-06-07 22:18:00 |
Is Kevin Mitnick a Famous White Hat Hacker? (lien direct) |
Kevin Mitnick is considered one of the best hackers in the world, but what kind of hacker is he? Formerly on the FBI's most-wanted list for his pranks and antics, Kevin is now a famous white hat hacker and leader of the Global Ghost Team. |
Guideline
|
|
|
|
2022-06-06 22:20:32 |
3 Things You Need To Know About Cyber Security Consulting Services (lien direct) |
According to Fortune, “The world saw an alarming 105% surge in ransomware cyberattacks” in 2021, with no indication that 2022 will be any different. In fact, bad actors are growing bolder by the day and attacking everyone from Facebook's parent company Meta to organizations like yours. |
Ransomware
|
|
|
|
2022-06-02 22:18:32 |
Pros and Cons of Vulnerability Scanning vs Penetration Testing (lien direct) |
When it comes to an organization's cybersecurity, vulnerability scanning and penetration testing can protect your business from threat actors. But what are the differences, and when should you use one over the other? |
Threat
Vulnerability
|
|
|
|
2022-05-17 14:03:00 |
What Are the Biggest Cyber Security Threats to Your Business? (lien direct) |
Cyber security threats can come in multiple forms. Recently, ABC News reported that threat actors accessed user account information from Facebook's parent company Meta by pretending to be law enforcement officials. This cyber attack - a form of social engineering - although surprising, was not unprecedented. |
Threat
|
|
|
|
2022-05-10 12:53:06 |
Why Did Kevin Mitnick Become a Hacker? (lien direct) |
The king of computer hacking and information security, Kevin Mitnick, is a name that instills curiosity - and sometimes terror - into the minds of many within the world of technology. |
|
|
★★★
|
|
2022-04-18 15:30:00 |
How To Book a Cyber Security Speaker for Your Event (lien direct) |
Any cybersecurity event - in-person or virtual - is only “worth it” if the audience is engaged and comes out of the event with the knowledge and power to improve the security posture of your organization. |
|
|
|
|
2022-04-12 20:29:19 |
What Is a Social Engineering Attack? (lien direct) |
Most organizations use security scans to protect their data and employees from threat actors, however, a simple scan may not be updated or thorough enough to catch everything. Additionally, a scan doesn't account for one major vulnerability within an organization: its employees. |
Threat
Vulnerability
|
|
|
|
2022-04-07 14:41:29 |
5 of the Best Cybersecurity Books (lien direct) |
Cybersecurity can be defined as the ways in which an organization protects itself against unauthorized access or unauthorized use of the organization's network, private data, or assets. When organizations suffer data breaches and compromised systems at the hands of threat actors, they often look for ways to improve their cybersecurity posture, and cyber security books are a great way to do this. |
Threat
|
|
|