Tag

Social Engineering

Learn how attackers use psychological manipulation to trick people into revealing sensitive information or performing unsafe actions. Topics include pretexting, baiting, tailgating, vishing, and real-world social engineering case studies that expose common human vulnerabilities.

posts

Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In May 2021, a single compromised VPN password shut down the largest fuel pipeline in the United States. The Colonial Pipeline attack didn't start with some exotic zero-day exploit. It started with a stolen credential. That's the reality of how ransomware spreads — and it's

Carl B. Johnson Nov 30, 2019 6 min read
Cybersecurity Incident Examples

Cybersecurity Incident Examples That Changed Security

A Single Stolen Password Started a $4.4 Billion Problem In May 2021, a single compromised password shut down the Colonial Pipeline — the largest fuel pipeline in the United States. Fuel shortages hit the East Coast. Panic buying emptied gas stations across multiple states. The company paid a $4.4

Carl B. Johnson Oct 09, 2019 7 min read
Insider Threat Awareness

Insider Threat Awareness: What Most Companies Miss

The Threat Already Inside Your Building In January 2023, the FBI arrested a former GE Aviation employee who had spent years downloading thousands of proprietary turbine technology files and transferring trade secrets to a competing business in China. The insider had legitimate access. He passed every background check. He sat

Carl B. Johnson Oct 01, 2019 6 min read
Insider Threat Examples

Insider Threat Examples: Real Breaches That Cost Millions

The Threat Already Inside Your Building In 2022, a former employee at Cash App's parent company, Block, downloaded reports containing the personal information of 8.2 million customers — months after leaving the company. Block disclosed the breach in an SEC filing, and lawsuits followed. The attacker didn'

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threats

Malicious Insider vs Negligent Insider: Real Threat Guide

One Employee Stole Data for Profit. The Other Just Clicked the Wrong Link. In 2022, a former employee of a major healthcare organization was sentenced to federal prison for stealing patient records and selling them. That same year, the Verizon Data Breach Investigations Report found that 82% of breaches involved

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threat Indicators

Insider Threat Indicators: 9 Red Flags You Can't Ignore

The Breach That Came From the Inside In 2022, a former Twitter employee was convicted of spying on behalf of Saudi Arabia, accessing the personal data of dissidents using nothing more than his legitimate credentials. No malware. No phishing email. Just an insider with access and motive. That case made

Carl B. Johnson Oct 01, 2019 7 min read
Securing Remote Employees

Securing Remote Employees: A Practical Guide for 2026

In 2023, a single remote employee at a major casino operator received a phone call from someone claiming to be IT support. That social engineering attack — a vishing call lasting roughly ten minutes — gave threat actors the foothold they needed to deploy ransomware across MGM Resorts' entire network, causing

Carl B. Johnson Sep 28, 2019 8 min read
Cybersecurity for Law Firms

Cybersecurity for Law Firms: A Practical Defense Guide

Why Threat Actors Treat Law Firms Like ATMs In 2023, the international law firm Bryan Cave Leighton Paisner disclosed a breach that exposed the personal data of over 51,000 individuals — including clients of major corporations like Mondelēz. That same year, an Am Law 100 firm paid a multimillion-dollar ransom

Carl B. Johnson Sep 10, 2019 7 min read
Cybersecurity for Nonprofits

Cybersecurity for Nonprofits: A Practical Defense Guide

The Breach That Cost a Children's Charity Everything In 2023, Save the Children International confirmed it was hit by the BianLian ransomware group, which claimed to have stolen nearly 7 GB of data including financial records, personal information, and medical data. A global nonprofit with substantial resources still

Carl B. Johnson Sep 10, 2019 6 min read