If you've been in cybersecurity long enough, you develop a reflex: dramatic claims usually aren't true. So when a tweet started circulating in early April 2026 alleging 10 petabytes of data had been stolen from China's National Supercomputing Center in Tianjin—including defense documents and missile research—my reaction was the same as most practitioners: prove it. This brings us to the crucial question: did it really happen?
The 10-Petabyte Heist: The Recent China Supercomputing Breach Means
Topics: Cybersecurity, Penetration Testing, Monitoring, MXDR, Policies & Procedures, china
StealthCraft: Unveiling the Path to Total Domain Domination
With EDR (Extended Detection and Response) becoming more necessary and common, it begs the question of what tactics and techniques are evading these protections. ProCircular recently conducted a penetration test involving evasion methods that did just that by successfully bypassing EDR protections by leveraging lay-of-the-land tools and incident response techniques. Our objective was to achieve full domain compromise within the targeted network, demonstrating the vulnerabilities and potential weaknesses that need to be addressed for robust cybersecurity. A walkthrough of the attack can be examined below.
Topics: Cybersecurity, Penetration Testing, Incident Response, hacking
Now Open: The FCC’s Schools and Libraries Cybersecurity Pilot Program
The FCC’s Schools and Libraries Cybersecurity Pilot program is now open for FCC Form 484 Part 1and we’d like to take a moment to help qualifying organizationsget the most bang from their submission.
Topics: Cybersecurity, Information Security, Data Protection, Penetration Testing, Incident Response, Monitoring, MXDR
Topics: Cybersecurity, Vulnerability Assessment, Penetration Testing, Incident Response, Security Awareness Training
FTC Strengthens Data Security: What The Newest Safeguards Rule Amendment Means For Financial Institutions
In 1999, Congress passed the Gramm-Leach-Bliley Act, which requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data.[1] The Act mandated the passage of the Safeguards Rule, which was promulgated by the Federal Trade Commission (FTC) in May 2002 and made effective May 2003.[2] In 2019, the FTC began working on amendments to the Safeguards Rule, and on December 9, 2021, the FTC finalized these amendments.[3] Depending on the classification of their financial institution, clients will need to understand the following rule changes and properly abide by the new FTC regulations.
Topics: Cybersecurity, Penetration Testing, Risk Assessment, Banking, Financial Institutions
