PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

The 10-Petabyte Heist: The Recent China Supercomputing Breach Means

Posted by Aaron R. Warner on Apr 9, 2026 4:55:05 PM

If you've been in cybersecurity long enough, you develop a reflex: dramatic claims usually aren't true. So when a tweet started circulating in early April 2026 alleging 10 petabytes of data had been stolen from China's National Supercomputing Center in Tianjin—including defense documents and missile research—my reaction was the same as most practitioners: prove it. This brings us to the crucial question: did it really happen?

Read More

Topics: Cybersecurity, Penetration Testing, Monitoring, MXDR, Policies & Procedures, china

A CEO’s Dilemma: Balancing Growth with Cyber Resilience

Posted by ProCircular Team on Feb 20, 2025 10:01:41 AM

As a CEO, you’re the captain of a ship, navigating the high seas toward growth and innovation. But every time you set sail toward new horizons; you’re also charting a course through shark-infested digital waters. With every new mile marker, your attack surface increases, and so does your exposure to cyber threats. 

Read More

Topics: Cybersecurity, Network Security, Data Security, Data Protection, risk, Monitoring, Attack Surface Profiler

The Constant Challenge: Keeping Your External Attack Surface in the Fast Lane

Posted by ProCircular Team on Feb 18, 2025 2:04:51 PM

In the world of IT, we’re all drivers on a high-speed track. With cloud infrastructures, remote workforces, third-party integrations, and the wild card of Shadow IT, our attack surface expands like a growing racetrack full of sharp turns and unexpected obstacles. 

Read More

Topics: Cybersecurity, Network Security, Data Security, Data Protection, risk, Monitoring, Attack Surface Profiler

Now Open: The FCC’s Schools and Libraries Cybersecurity Pilot Program

Posted by ProCircular Team on Sep 17, 2024 3:31:11 PM

The FCC’s Schools and Libraries Cybersecurity Pilot program is now open for FCC Form 484 Part 1and we’d like to take a moment to help qualifying organizationsget the most bang from their submission.  

Read More

Topics: Cybersecurity, Information Security, Data Protection, Penetration Testing, Incident Response, Monitoring, MXDR

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates