Blog

Telecoms Manager Admits to Taking Bribes to Help Carry Out SIM Swapping Attacks

A New Jersey man faces five years in prison after taking hefty bribes and commissions to help cybercriminals in SIM swapping attacks.

Cybercriminals use SIM swapping, or SIM jacking, to port a victim’s number to a SIM card in their control and take over their accounts by intercepting two-factor authentication codes.

Continue reading “Telecoms Manager Admits to Taking Bribes to Help Carry Out SIM Swapping Attacks”

Best Practices for Penetration Testing: Optimal Timing and Effective Techniques

Threat actors are leaping over traditional barriers with ease, demanding sharper defenses for our widening attack surfaces. They are constantly on the move, probing IT infrastructure to identify vulnerable systems – including unpatched endpoints, network misconfigurations, unsecured APIs, and long-forgotten cloud permissions. Keeping up with network changes and closing these security gaps is a never-ending, manual endeavor that saps IT resources, time, and morale. The result: unnecessary security risk. After all, you can’t secure what you don’t know about. 

Continue reading “Best Practices for Penetration Testing: Optimal Timing and Effective Techniques”