PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

The 10-Petabyte Heist: The Recent China Supercomputing Breach Means

Posted by Aaron R. Warner on Apr 9, 2026 4:55:05 PM

If you've been in cybersecurity long enough, you develop a reflex: dramatic claims usually aren't true. So when a tweet started circulating in early April 2026 alleging 10 petabytes of data had been stolen from China's National Supercomputing Center in Tianjin—including defense documents and missile research—my reaction was the same as most practitioners: prove it. This brings us to the crucial question: did it really happen?

Read More

Topics: Cybersecurity, Penetration Testing, Monitoring, MXDR, Policies & Procedures, china

Why Kids Turn to Cybercrime

Posted by Aaron R. Warner on Mar 27, 2026 11:31:45 AM

I spoke with a reporter this morning who asked me a simple question: Why do kids turn to cybercrime? After some fun and genuinely insightful conversations with my colleagues at ProCircular, ages 20 to 55+, here’s what we were able to cobble together.

Read More

Topics: Cybersecurity, Cybersecurity Consulting

Lessons from Strkyer: Dual Controls, Multi-Admin Approval & Recent Cyberattacks

Posted by Keegan Paisley on Mar 18, 2026 3:13:06 PM

Written by Willie Zhang and Keegan Paisley

On March 11th, medical technology manufacturer Stryker disclosed a cybersecurity incident affecting its internal IT systems. The attack caused a global disruption to the company's Microsoft environment. Stryker activated its incident response process and brought in outside cybersecurity specialists.

Read More

Topics: Cybersecurity, Information Security, Incident Response, healthcare, Compliance, GRC

ClickFix: The Latest Twist in Social Engineering Scams

Posted by ProCircular Team on May 1, 2025 2:57:30 PM

ProCircular has been monitoring a troubling uptick in ClickFix attacks—a sneaky form of social engineering that tricks users into running harmful scripts on their systems. This type of attack is particularly clever, masquerading as legitimate interactions to catch users off guard.

Read More

Topics: Cybersecurity, Data Protection, Security Awareness Training, MXDR, social engineering

StealthCraft: Unveiling the Path to Total Domain Domination

Posted by Alexis Diediker on Apr 2, 2025 12:05:55 PM

With EDR (Extended Detection and Response) becoming more necessary and common, it begs the question of what tactics and techniques are evading these protections. ProCircular recently conducted a penetration test involving evasion methods that did just that by successfully bypassing EDR protections by leveraging lay-of-the-land tools and incident response techniques. Our objective was to achieve full domain compromise within the targeted network, demonstrating the vulnerabilities and potential weaknesses that need to be addressed for robust cybersecurity. A walkthrough of the attack can be examined below.

Read More

Topics: Cybersecurity, Penetration Testing, Incident Response, hacking

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates