Ben CardFeb 125 min readManual vs. Automated Penetration Testing: What You Need to KnowBoth methods have their advantages and disadvantages, and choosing the right one depends on several factors.
Ben CardSep 7, 20232 min readIs AI Automation of Security Safe?AI is increasingly being used in cybersecurity to protect against cyberattacks, but is it safe?
Ben CardMay 1, 20232 min readSevere Android Vulnerability Exploited by Chinese Actors1 of 2 vulnerabilities recently added to the U.S. Cybersecurity and Infrastructure Security Agency has seen evidence of active exploitation
Ben CardMar 6, 20234 min readBest Practices for Effective Phishing Campaigns10 Things You Can Do To Improve Your Phishing Campaigns
Ben CardNov 29, 20223 min readRansomware Attacks Increase During Holidays & Weekends--When Security Teams Are Least PreparedThe primary causes of costly security breaches—and longer investigation times—is a combination of insufficient SOC staffing and....
Ben CardNov 22, 20222 min readNew Use of Windows Security Bypass for Malware DeliveryResearchers have found that a new phishing attack is able to take advantage of a Windows zero-day flaw to deliver malware.
Ben CardOct 27, 20224 min readSecurity Awareness Training: A High-Value ProgramBuilding a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
Ben CardSep 6, 20225 min readTop 10 Things to Look for in a Pen Testing VendorWhat to Look for and what to Avoid When Choosing a Pen-testing Vendor or Provider
Greg JohnsonOct 19, 20211 min readBLACKMATTER RANSOMWAREHow vulnerable are you? Even if you aren’t critical infrastructure, you too could be vulnerable.