4 min read
What is Pretexting? How to Avoid Being Victimized
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
4 min read
Pretexting is a type of social engineering attack that is often used to gain access to confidential information. In a pretexting attack, the attacker...
4 min read
Phishing is one of the most common and well-known social engineering techniques. It's the process of sending emails (or texts, which is known as...
1 min read
As soon as a new employee starts at an organization, they become a target for cybercriminals.
1 min read
Approximately two weeks ago we provided guidance for organizations concerned about cyber threats stemming from the Russia-Ukraine conflict.
1 min read
As the Russia-Ukraine conflict continues, many people and organizations have expressed concerns about the potential for cyber-warfare and its...
2 min read
As the tensions mount between Ukraine and Russia the expectations of cyber attacks against the United States are increasing rapidly, and nonprofit...
4 min read
Social engineering is one of the foremost ways that hackers and other bad actors will try and penetrate an organization's cybersecurity defenses....
4 min read
As we head into 2022 with Delta and Omicron on our minds and cautious hopes that this will be the year we finally put this disruptive pandemic in our...
3 min read
Update from 12/21 The team at RoundTable has continued to scan and enumerate (e.g. discover) any presence of the log4j vulnerability across our...
3 min read
"Ethical hacking" sometimes known as "white hat hacking" is similar in process to malicious hacking, but is 100% legal. People who engage in ethical...