PROCIRCULAR BLOG

Educating your business on the importance of cybersecurity

Rolling the Dice on Cybersecurity: Lessons from the MGM Breach

Posted by Jake McGreevy on Oct 18, 2023 11:17:58 AM

You may have seen it in the news, but another major company has been a victim of a nasty ransomware attack that disrupted services and customers for over ten days. This time, the victim was MGM Resorts in Las Vegas.

What separates this major incident from others is that the hackers pulled the malicious attack off using one of the oldest tricks in the book: social engineering. So, what happened, and what can we learn from this?

Read More

Topics: Cybersecurity, Network Security, Data Breach, Data Security, security incident handling, risk, Ransomware, social engineering

When in doubt, try "Password123" - How I guessed your password

Posted by Mike Hedlund on Dec 10, 2021 2:56:13 PM

During a penetration test, login credentials are a highly sought-after item. While it is common to harvest that information via email scams (phishing attacks), it is not always the most practical or effective tactic to gain unauthorized access. That access, however, still requires a valid set of credentials. This poses a challenge. How does an attacker find valid accounts without social engineering? There are two main options: breached credentials and password spraying.

Read More

Topics: Cybersecurity, Network Security, Data Protection, Personal Data Protection, Security Awareness Training, Passwords, Monitoring

6 Benefits of Conducting a Cybersecurity Risk Assessment

Posted by Ty Hollins on Apr 22, 2021 1:49:00 PM

With so much of the world's business taking place online, cybersecurity threats have become increasingly prevalent. Cyberattacks cost companies millions of dollars a year, and not every business can recover from an incident like a data breach or ransomware hoax. A cybersecurity risk assessment evaluates how potential weaknesses could impact your organization.

Read More

Topics: Cybersecurity, Network Security, Risk Assessment

How to Choose the Best SIEM System: 5 Things to Consider

Posted by Jarrod Thompson on Mar 18, 2021 3:19:26 PM

Security information and event management, or “SIEM,” is a tool that assimilates all of your log data to give you an all-encompassing overview of the activity on your network. SIEM tools watch over your network and help you stop trouble in its tracks. Whether your organization has 200 or 20,000 employees, SIEM software can be a vital part of any company’s cybersecurity posture.

Read More

Topics: Cybersecurity, Network Security, SIEM, Monitoring

Using an Interactive Cross-site Scripting Backdoor

Posted by Bill Thomas on Feb 26, 2021 3:29:48 PM

As a cybersecurity engineer and an unapologetically enthusiastic “web guy,” I have both a personal and professional interest in finding new exploitation methods. Recently, I found an interesting and creative way to control a browser by exploiting a cross-site scripting (XSS) vulnerability. I learn by doing, so I executed the concept to see it work in practice. Without spoiling too much, I was very pleased with the results! This attack uses nothing more than Netcat and some clever XSS injection code. For those unfamiliar with Netcat, it’s a networking utility that reads and writes data across network connections.

Read More

Topics: Network Security, Data Protection, Penetration Testing, hacking

  • There are no suggestions because the search field is empty.

ProCircular is a Full-Service Information Security Firm

We are passionate about helping businesses navigate the complex world of information security, and our blog is another great source of inforamtion. We can assist you no matter where you are in your security maturity journey:

  • Breached or hit with ransomware?
  • Don't know where to start? 
  • Looking to confirm your security with a third party?

Secure your future with ProCircular.

Recent Posts

Subscribe to Email Updates