Cyber Chief Magazine: Strategies for protecting your data in the cloud Download Now
1 May, 2019 | Brian Johnson

What Are Mousejacking Attacks, and How to Defend Against Them

If you are using a wireless keyboard or mouse on your computer, beware of the risk of getting mousejacked. Using this technique, attackers could take over your entire Active Directory in just minutes using a $15 USB radio device that discovers vulnerable devices. In this podcast, Brian Johnson,...
22 November, 2018 | Kayla Matthews

Top 10 Cyber Attack Maps and How They Can Help You

Cyber attacks are becoming more common and more sophisticated every year, and cybersecurity professionals often find themselves struggling to keep up. Cyber attack maps are a valuable tool that can give them the information they need to stay ahead of attacks. Here are the top ten cyber attack maps...
5 September, 2018 | Jeff Melnick

What Is Privilege Escalation?

Privilege escalation is a common threat vector for adversaries, which allows them to enter organizations’ IT infrastructure and seek permissions to steal sensitive data, disrupt operations and create backdoors for future attacks. Elevated privileges open doors for attackers to mess with security...
21 June, 2018 | Ryan Brooks

SysAdmin Magazine: Confessions of a Hacker

Hackers are always lurking nearby, ready to exploit any mistake you make in order to infiltrate your network. Stay one step ahead! Learn how they think, act and hide their nasty moves in the June edition of SysAdmin magazine. 4 Steps You Should Take If You Have Been Hacked A data breach...
15 May, 2018 | Jeff Melnick

Top 10 Most Common Types of Cyber Attacks

A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems. Today I’ll describe the 10 most common cyber attack...
Show more articles