In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests Nathan Sweaney, Senior Security Consultant at Secure Ideas and Kevin Johnson, CEO of Secure Ideas.
** Links mentioned on the show **
GoPhish – Open Source Phishing Framework
https://getgophish.com/
Follow Nathan on Twitter
https://twitter.com/sweaney
Follow and connect with Secure Ideas
https://secureideas.com/
** Watch this episode on YouTube **
** Thank you to our sponsors! **
Silent Pocket
Visit https://silent-pocket.com to check out Silent Pocket’s amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code “sharedsecurity”.
Edgewise Networks
Find out how Edgewise can stop lateral threat movement and prevent data breaches. Visit https://edgewise.net and request a demo!
Click Armor
To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity
** Help support the show **
Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link: http://www.privateinternetaccess.com/pages/buy-vpn/sharedsecurity
** Subscribe and follow the show **
Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors: http://eepurl.com/dwcc8D
Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe
Contact us: https://sharedsecurity.net/contact
Website: https://sharedsecurity.net
Twitter: https://twitter.com/sharedsec
Facebook: https://facebook.com/sharedsec
Instagram: https://instagram.com/sharedsecurity
YouTube: https://www.youtube.com/c/SharedSecurityPodcast
The post Targeted Attacks Part 2 – Pretexting and Attack Development appeared first on The Shared Security Show.
*** This is a Security Bloggers Network syndicated blog from The Shared Security Show authored by Tom Eston. Read the original post at: https://sharedsecurity.net/2020/09/29/targeted-attacks-part-2-pretexting-and-attack-development/
One in four industrial enterprises had to temporarily cease operations due to cyberattacks within the past year, suggesting operational technology…
NSFOCUS CERT has detected that details and a proof-of-concept (PoC) tool for a Linux kernel privilege escalation vulnerability CVE-2024-1086, have…
Recent reports about legal proceedings, a 34-year-old Russian-Canadian national, Mikhail Vasiliev, has been handed a sentence of almost four years…
Reading Time: 2 min Discover how Infinite IT transforms its email defense capabilities through the PowerDMARC MSP Program in this…
ForgePoint Capital and Prefix Capital Double-Down on Data Store and Object Security as Lead Investors Symmetry Systems, provider of cutting-edge…
Threat management is a process that is used by cybersecurity analysts, incident responders and threat hunters to prevent cyberattacks, detect…