The Visibility Paradox: The Impossible Dilemma Executives Face in the Digital Vulnerability Era

Windsor Castle has stood for nearly a thousand years—visible for miles, a symbol of power that has hosted kings and presidents watched by millions. Yet behind its public façade lie private apartments and escape routes known only to those who... Read More

Protecting Against Social Engineering and Credential Stuffing

NIST CSF, MITRE ATT&CK, and HASP frameworks In today’s digital world, the ever-evolving landscape of cybersecurity threats poses significant challenges for organizations. Two major concerns are social engineering and credential stuffing, the attack vectors responsible for most breaches. Organizations rely... Read More

MGM Resorts International September 2023 Ransomware Attack

Download PDF Incident Name: MGM Resorts International September 2023 Ransomware Attack Date of Incident: September 10th, 2023 Summary: On September 11th, 2023, MGM Resorts International announced that they are currently dealing with a cyber attack that is impacting their company’s systems and... Read More

Kroll August 2023 SIM Swap Attack

Download PDF Incident Name: Kroll August 2023 SIM Swap Attack Date of Incident: August 19th, 2023 Summary: Kroll is a global company providing organizations with risk and financial solutions. On August 19th, 2023, they discovered that a T-Mobile account belonging to a... Read More

Okta August 2023 Social Engineering Attack Advisory

Download PDF Incident Name: Okta August 2023 Social Engineering Attack Advisory Date of Incident: August 2023 Summary: Okta, a provider of identity and authentication services, recently issued a warning to its customers regarding an ongoing, sophisticated social engineering attack that has been... Read More

CoinsPaid July 2023 Social Engineering Attack

Download PDF Incident Name: CoinsPaid Social Engineering Attack Date of Report: August 7th, 2023 Date of Incident: July 22nd, 2023 Summary: CoinsPaid, one of the world’s largest cryptocurrency payment providers, suffered a cyber attack on July 22, 2023, which resulted in the theft... Read More

How Threat Actors Exploit Generative AI For Social Engineering and Credential Compromise

Social engineering attacks are one of the most commonly used methods for cyber criminals to gain access to sensitive data and information. Recent advances in generative AI have enabled threat actors to utilize AI-generated content to fuel these attacks, making... Read More

How to Proactively Protect Your Organization’s High-Value Targets

Cybercriminals are always looking for ways to exploit the exposed personal data of high-value targets to breach companies. High-value targets (HVTs) are those individuals within an organization who have access to sensitive information or assets and have the potential to... Read More

Human Element Remains Key Factor in Cybersecurity: The 2023 Verizon DBIR Report and VanishID’s Global Threat Intelligence Findings

The spotlight in the fight against cybercrime continues to be an often overlooked yet pivotal factor – the human element. A profound understanding of this dimension is vital for safeguarding digital ecosystems, and the recently published 2023 Verizon Data Breach... Read More

Threat-Informed Defense for Human Attack Surface: Mapping Threat Intelligence to Target Intelligence

The exploitation of human attack surface data and a crucial intelligence gap According to Verizon’s 2022 DBIR report, stolen passwords and phishing were the top two techniques used by threat actors last year, accounting for around 70% of all analyzed breaches.... Read More

Copyright © 2019 – 2025 Picnic Corporation (dba VanishID)