When Threat Actors Pose as MSPs: New Insights from Steve Stasiukonis in Dark Reading

How Criminals Are Exploiting the Trust Businesses Place in Managed Service Providers It’s one of the most unsettling trends in cybersecurity: criminals posing as managed service providers (MSPs) to gain a foothold in business networks. In his latest article for Dark...

How Smarter Social Engineering Tactics are Reshaping Cybersecurity – Insights from Our Own Steve Stasiukonis

Featured on Dark Reading: Our President Weighs in on the Evolution of Digital Deception Social engineering is evolving — and so are the criminals behind it. In a recent piece published on Dark Reading, our own Steve Stasiukonis breaks down the growing sophistication...
Hacked for the Holidays - SNT

Hacked for the Holidays

Kick off your shoes, turn on the game, put your feet up. Crack a cold one, wait for family and friends to arrive (maybe via zoom given the circumstances) and bask in the few moments of reprieve from running your team, your business, your projects and tasks. Finally,...

Authentic8 Podcast Features Secure Network – Breaking In: How to Use OSINT for Pen Testing

https://www.youtube.com/watch?v=PL0fmFQiZOw Authentic8 recently featured Secure Network's Steve Stasiukonis on how OSINT can be used effectively for Penetration Testing. Recently, Authentic8 featured Secure Network's Steve Stasiukonis on their podcast, discussing how...

Protect Your Business with Risk-Based Penetration Testing

Cybersecurity threats are on the rise, and organizations of all sizes are vulnerable to attacks. Hackers are constantly looking for ways to exploit vulnerabilities in your systems and applications, and the consequences can be severe: from data breaches to financial...

MHEDA Journal – A Desire to Learn

Throughout her varied career, Megan Cardish has prioritized one goal, no matter the industry or job: to learn as much as she possibly can. After she graduated from college and started working for a real estate developer – an experience she said felt like drinking from...

Sophos State of Cybersecurity 2022 Report

Sophos has released their 2022 report on the current state of cybersecurity. Click the images below to download the report or view in-browser as a PDF. Sophos' annual study of the real-world ransomware experiences of IT professionals working at the frontline has...

Data Protection and the Future of Your Business

Data protection. What does that really mean and why does it matter? You may have come across a multitude of headlines in the last few years referring to “cyber security” in some way, shape or form – whether it’s talking about hackers, foreign states hacking energy...

Secure Network Welcomes Matt Hetelson

Secure Network Technologies would like to welcome Matt Hetelson to our growing team as a Senior Information Security Engineer. Matt has over 7 years in cyber security with both the United States Marines and other cyber security organizations. Previous experience...

Secure Network Welcomes Ryan Wager

Syracuse, NY – January 5, 2022 - Secure Network Technologies would like to welcome Ryan Wager to our growing team as an Information Security Engineer. Wager has over nine years in cyber security with a proven record designing, architecting, and testing solutions...

Cybersecurity News

10 Years of Human Hacking

10 Years of Human Hacking

10 Years Of Human Hacking: How ‘The USB Way’ Evolved After a decade of clicking without consequence, users still haven't gotten the message about the dangers of rogue USB devices with malware hidden inside....

read more

Company News

Maze – The 2.0 of Ransomware

Maze – The 2.0 of Ransomware

Maze Ransomware is the most dangerous ransomware we have seen to date. We dubbed it “Ransomware 2.0” because we think you will be seeing more and more of this type of ransomware throughout 2020. It’s like...

read more
Travel Intelligence Part 1: Pre-Travel Planning

Travel Intelligence Part 1: Pre-Travel Planning

By Chris Clark, Chief Intelligence Analyst | November 9th, 2019 We are living in an interconnected world. With an ever-increasing amount of business being conducted on a global scale, more and more executives...

read more

HACKER’S DICTIONARY

Sign Up to Get the H4X0R Word of the Month Delivered to Your Inbox

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

SCHEDULE YOUR FREE CONSULTATION