Subscribe
Daxin Backdoor: Chinese Cyber Espionage Exposed

Daxin Backdoor: Chinese Cyber Espionage Exposed


Posted March 16, 2022 in Malware, Data Breach, Cloud Security

Researchers uncovered Daxin, a sophisticated Chinese backdoor used for cyber espionage since 2013. Learn how this...

Vulnerability Scans vs Pen Tests: NIST 800-171

Vulnerability Scans vs Pen Tests: NIST 800-171


Posted March 8, 2022 in CMMC, NIST, Compliance, Penetration Testing, Digital Forensics

Government contractors must understand the difference between vulnerability scans and penetration tests under NIST...

Russian Cyber Attacks: Banks Face Growing Threat

Russian Cyber Attacks: Banks Face Growing Threat


Posted February 28, 2022 in Ransomware, Malware, Data Breach

Escalating sanctions increase the risk of Russian cyberattacks against US financial institutions. Learn what banks...

Russian Cyberwar: Is Your Business Prepared?

Russian Cyberwar: Is Your Business Prepared?


Posted February 24, 2022 in Ransomware, Data Breach, Malware

Government agencies warn that Russian cyber threats target US businesses of all sizes. Assess your readiness and...

San Francisco 49ers Hit by Ransomware Attack

San Francisco 49ers Hit by Ransomware Attack


Posted February 15, 2022 in Ransomware, AI, Malware, Data Breach

The San Francisco 49ers confirmed a ransomware attack on their systems. See how cybercriminals targeted the NFL team...

Cryptocurrency Security: Protect Your Digital Assets

Cryptocurrency Security: Protect Your Digital Assets


Posted February 10, 2022 in Blockchain, Cryptocurrency, Bitcoin, Compliance, Data Breach

As cryptocurrency grows more accessible, so do the threats targeting digital assets. Learn essential security...

Petronella Featured on WRAL Channel 5 News

Petronella Featured on WRAL Channel 5 News


Posted February 2, 2022 in Data Breach, Malware, Compliance

Petronella Technology Group was featured on WRAL Channel 5 covering record data breaches. Watch the segment and learn...

Backdoor Malware: The Hidden Cyber Threat

Backdoor Malware: The Hidden Cyber Threat


Posted January 25, 2022 in AI, Malware, Data Breach

Backdoor malware gives attackers persistent access to your systems without detection. Learn how backdoors work and...