Should you hack the company you’re applying to for a cybersecurity job?

Professional hacker with laptop sitting at table on dark background

If you’re interested in cybersecurity or offensive security, you’ve probably heard the stories of Jhonny Chung Lee, George Hotz, or Peter Ajas. These hackers were hired by the top tech companies they hacked. The Internet is packed with stories like these, inspiring awe in other technical people who wish they could work for Twitter, Google, […]

The evolution of cybersecurity through cyberattacks: the SQL slammer worm

Wooden tiles spelling SQL

After the Morris Worm and the Melissa Virus, let’s continue our time travel through the cyberattacks that have made cybersecurity practices history. In 2003, the SQL slammer worm spread across the Internet and turned off large parts of the server infrastructure within minutes. Due to its impact, patch management practices were implemented to ensure critical […]

How to protect your business from ransomware

Person working on a laptop computer that has been seized by a ransomware cyber attack. hacked virus

Ransomware has become one of the most pervasive and costly threats to businesses worldwide. In 2023 alone, North American companies faced over $1 billion in ransomware payouts, with global costs estimated to reach $265 billion annually by 2031. However, ransomware attacks can be prevented. This guide provides actionable steps to safeguard your organization from ransomware […]

Cybersecurity trends for 2025: priorities and risks to be aware of

Artificial intelligence concept

2024 has just stepped out of the door and, with it, some of the worst hacks and data breaches in history. The Salt Typhoon Campaign, the Snowflake Data Breach, the Change Healthcare Ransomware Attack, the Midnight Blizzard’s Microsoft Breach, and the North Korean Cryptocurrency Theft are only some worth mentioning. Social media security is also […]

Cybersecurity Horoscope for 2025

Zodiac horoscope with divination dice

What does the digital cosmos hold for your organization this year? Read on to discover your cybersecurity fate, tailored to your risk profile and readiness! Aries (March 21 – april 19) “Lead the charge, but double-check your shields.” You’ll blaze new trails in technology adoption, but don’t let your enthusiasm outpace your defences. Zero Trust […]

The evolution of cybersecurity through cyberattacks: the Melissa Virus

Concept of cyber threat, hacker, computer virus. Danger sign on computer keyboard.

Some time ago, we started a thread of posts dedicated to the cyber incidents in history that have shaped cybersecurity practices and their evolution. Today, we want to talk about the Melissa Virus, a mass email malware that caused disruptions in the late Nineties, infecting thousands of systems globally.  Melissa opened the door to more […]

The evolution of cybersecurity through cyberattacks: the Morris Worm

padlock on a computer circuit board

A few weeks ago, we talked about how the events of 9/11 2001 have affected the evolution of cybersecurity. However, this evolution started long before 9/11: the need to protect users and their assets has emerged since the early days of the Internet with the spread of malware. Not all of it caused changes. However, […]

Lessons learnt from 9/11: how modern cybersecurity came to be

On this day, we remember the shocking attacks on the United States and their thousands of victims. September 11 remains an unparalleled event that changed the course of history. It was also a major catalyst for subsequent reforms and technological advancements in the intelligence and security fields. In this article, we want to summarize all […]

One year of Negative PID

At Negative PID, we have just celebrated our first year in business. Saying it’s been a wild ride would be reductive. It’s been a lot of hard work, surprises, but most of all, a big learning curve. In this post, our founder, Simona, summarizes what it’s been like to create a company from the ground […]