10 Oct 2023
Can You Spot a Phishing Scam?
Every day, thousands of people fall victim to fraudulent emails, texts and calls from scammers pretending to be their bank. And in this ...
21 Sep 2023
Planning Your Annual Pentest
A Checklist of Penetration Testing Best Practices Penetration testing, often referred to as ethical hacking, is a vital component in ...
24 Aug 2023
Attack Surface Monitoring
On Memorial Day weekend, the Clop ransomware gang began exploiting a zero-day vulnerability in a secure file transfer application, MOVEit. ...
10 Aug 2023
8 Crucial Items to Add to Your Incident Response Plan
Cybersecurity is always evolving. However, the last two years have ushered in exceptionally fast rates of change in cyberattack techniques, ...
25 Jul 2023
Zero Day Exploit Prevention and Response Checklist
Over 122 organizations have announced a breach due to the new zero day exploit affecting the MOVEit file transfer software, and that number ...
10 Jul 2023
Social Engineering – Phishing/Vishing/Smishing
What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or ...