Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2024-07-03 13:48:06 |
The Growth of Third-Party Software Supply Chain Cyber Attacks (lien direct) |
|
Threat
|
|
★★★
|
|
2024-06-28 14:23:55 |
La croissance des cyberattaques de la chaîne d'approvisionnement des logiciels tiers The Growth of Third-Party Software Supply Chain Cyber Attacks (lien direct) |
|
Threat
|
|
★★★
|
|
2024-05-06 14:31:18 |
Qu'est-ce que la récolte d'identification et comment les acteurs de la menace le réalisent-ils? What Is Credential Harvesting and How Do Threat Actors Pull It Off? (lien direct) |
79% Les comptes d'entreprise ont été compromis par les acteurs de la menace utilisant des tactiques de récolte d'identification, telles que le phishing des informations d'identification.
Credential harvesting, otherwise known as credential compromising or credential theft, can be a highly devastating cyber threat. It also happens to be very successful, as over 79% of business accounts were compromised by threat actors using credential harvesting tactics, such as credential phishing. |
Threat
|
|
★★
|
|
2024-04-04 13:19:05 |
Choisir une entreprise de test de pénétration pour les environnements basés sur Mac Choosing a Penetration Testing Company for Mac-based Environments (lien direct) |
|
Threat
|
|
★★
|
|
2023-07-19 13:34:40 |
Déception de l'utilisateur: les plus grands cisos des cybermenaces oublient User Deception: The Biggest Cyber Threat CISOs are Forgetting (lien direct) |
|
Threat
|
|
★★★
|
|
2023-03-24 14:56:26 |
Violation et simulation d'attaque vs équipe rouge Pentest [Breach and Attack Simulation vs Red Team Pentesting] (lien direct) |
|
Threat
General Information
|
|
★★
|
|
2023-03-20 13:13:00 |
Vulnerability Assessment From Mitnick Security (lien direct) |
Since threat actors are constantly developing new tools and techniques for infiltrating an organization's defenses, effective cybersecurity can never be a “set it and forget it” mentality. It's true that vulnerability scans and other software tools are important to your organization's security posture - but you also need a team of cyber security experts on your side to keep up with cyber criminals. Below, we'll discuss the value of an expert eye and what you can expect with a vulnerability assessment from Mitnick Security. |
Vulnerability
Threat
|
|
★★
|
|
2023-03-14 12:56:37 |
Pivoting in Cyber Security (lien direct) |
Data breaches in 2022 were abundant and sophisticated. Realistically, it's expected that this year we will continue to see threat actors test their limits and find new ways to infiltrate cybersecurity defenses and steal or exploit private data - potentially costing organizations billions of dollars in damages. But how do threat actors do it? Pivoting is the name of the technique that many threat actors would consider their number one weapon. |
Threat
|
|
★★
|
|
2023-03-07 17:00:00 |
What Is One-time Password (OTP) Social Engineering? (lien direct) |
Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: your employees. Social engineering has evolved over the years as threat actors deploy new methods of fooling their targets - untrained employees - into granting access to the inner workings of your organization. |
Vulnerability
Threat
|
|
★★
|
|
2023-02-28 20:55:00 |
Cyber Security Risks of Remote Employee Offboarding (lien direct) |
Remote work options are popular trends that provide flexibility for the employee and potentially a less expensive option for the employer. However, remote work devices can pose a real threat to your organization, especially after recent layoffs or organizational restructuring. We'll explore the potential vulnerabilities caused by unprotected devices as well as data breach prevention techniques to keep your organization's private data secure. |
Data Breach
Threat
|
|
★★
|
|
2023-01-12 09:42:00 |
Why Choose Mitnick Security for Your Penetration Testing Services? (lien direct) |
Incorporating cybersecurity services as part of your organization's security plan can help stop threat actors in their tracks. From cyber security awareness training to Red Team engagements, Mitnick Security offers a wide range of services designed to strengthen the security posture of businesses of all sizes. |
Threat
|
|
★
|
|
2022-11-23 15:57:25 |
Spear Phishing vs Phishing: Recognizing the Difference (lien direct) |
Since the dawn of the internet, there have been threat actors looking to exploit systems, steal data, and compromise the integrity and reputation of people and the organizations they serve. Although there are many types of cyber attacks, phishing accounts for around 25% of all data breaches. |
Threat
|
|
|
|
2022-10-06 17:00:00 |
5 Questions To Ask When Evaluating a Penetration Testing Company (lien direct) |
Whether your organization has been the victim of a recent data breach or your organization has never had expert penetration testing done before, it's probably time to call in cybersecurity experts. The right cybersecurity company can help you identify the strengths and weaknesses of your networks and systems so you can improve the security posture of your organization and stay one step ahead of threat actors. |
Data Breach
Threat
|
|
|
|
2022-09-01 21:58:00 |
3 Results From Your Penetration Testing Report That May Surprise You (lien direct) |
There are several steps you can take to protect your organization from threat actors, but how do you know if your cybersecurity posture is strong enough? Penetration testing - a simulated cyber attack performed by experts - is crucial when it comes to assessing your network's vulnerabilities. |
Threat
|
|
|
|
2022-07-21 17:13:00 |
The Most Common Social Engineering Techniques We\'re Seeing This Year (lien direct) |
With today's available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain system control of organizations. Not surprisingly, 98% of cyber attacks involve social engineering tactics. |
Threat
|
|
|
|
2022-06-02 22:18:32 |
Pros and Cons of Vulnerability Scanning vs Penetration Testing (lien direct) |
When it comes to an organization's cybersecurity, vulnerability scanning and penetration testing can protect your business from threat actors. But what are the differences, and when should you use one over the other? |
Vulnerability
Threat
|
|
|
|
2022-05-17 14:03:00 |
What Are the Biggest Cyber Security Threats to Your Business? (lien direct) |
Cyber security threats can come in multiple forms. Recently, ABC News reported that threat actors accessed user account information from Facebook's parent company Meta by pretending to be law enforcement officials. This cyber attack - a form of social engineering - although surprising, was not unprecedented. |
Threat
|
|
|
|
2022-04-12 20:29:19 |
What Is a Social Engineering Attack? (lien direct) |
Most organizations use security scans to protect their data and employees from threat actors, however, a simple scan may not be updated or thorough enough to catch everything. Additionally, a scan doesn't account for one major vulnerability within an organization: its employees. |
Vulnerability
Threat
|
|
|
|
2022-04-07 14:41:29 |
5 of the Best Cybersecurity Books (lien direct) |
Cybersecurity can be defined as the ways in which an organization protects itself against unauthorized access or unauthorized use of the organization's network, private data, or assets. When organizations suffer data breaches and compromised systems at the hands of threat actors, they often look for ways to improve their cybersecurity posture, and cyber security books are a great way to do this. |
Threat
|
|
|
|
2022-04-06 19:23:37 |
What Are the Phases of a Pentest? (lien direct) |
When your business is unprepared, threat actors can take advantage of vulnerabilities and compromise your systems. In some cases, vulnerability scans and assessments may help you get back on track. However, if you know you have an internal cyber security incident or have had one that you've been told is now “fixed,” a penetration test may be the right option to improve the security posture of your organization. |
Threat
|
|
|
|
2022-03-23 18:06:59 |
What is a Pentest Framework? (lien direct) |
Penetration tests are performed by cybersecurity companies to help find weaknesses in an organization's network, in internal systems, and show that organization how threat actors can exploit those vulnerabilities. |
Threat
|
|
|
|
2022-02-18 19:38:21 |
What is Product Claims Testing? (lien direct) |
What Is Product Claims Testing?
When it comes to protecting your organization, it is important to have full confidence in the products you sell or the services you purchase. Unfortunately, the cyber security industry is overflowing with companies that market products by grossly overstating their cyber threat detection capabilities. |
Threat
|
|
|