Targeted Attacks Part 2 – Pretexting and Attack Development

In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests Nathan Sweaney, Senior Security Consultant at Secure Ideas and Kevin Johnson, CEO of Secure Ideas.

** Links mentioned on the show **

GoPhish – Open Source Phishing Framework
https://getgophish.com/

Follow Nathan on Twitter
https://twitter.com/sweaney

Follow and connect with Secure Ideas
https://secureideas.com/

** Watch this episode on YouTube **

https://youtu.be/9zPZnA9gt34

** Thank you to our sponsors! **

Silent Pocket

Visit https://silent-pocket.com to check out Silent Pocket’s amazing line of faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 15% off your order at checkout using discount code “sharedsecurity”.

Edgewise Networks

Find out how Edgewise can stop lateral threat movement and prevent data breaches. Visit https://edgewise.net and request a demo!

Click Armor

To find out how “gamification” of security awareness training can reduce cyber risks related to phishing and social engineering, and to get a free trial of Click Armor’s gamified awareness training platform, visit: https://clickarmor.ca/sharedsecurity

** Help support the show **

Looking for an affordable, reliable, no logs VPN provider? Support the podcast by purchasing a Private Internet Access VPN subscription via our affiliate link: http://www.privateinternetaccess.com/pages/buy-vpn/sharedsecurity

** Subscribe and follow the show **

Sign-up for our email newsletter to receive our free Facebook Privacy & Security Guide, full transcripts of each weekly episode, contest announcements, and special offers from our sponsors: http://eepurl.com/dwcc8D

Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe

Contact us: https://sharedsecurity.net/contact

Website: https://sharedsecurity.net

Twitter: https://twitter.com/sharedsec

Facebook: https://facebook.com/sharedsec

Instagram: https://instagram.com/sharedsecurity

YouTube: https://www.youtube.com/c/SharedSecurityPodcast

The post Targeted Attacks Part 2 – Pretexting and Attack Development appeared first on The Shared Security Show.

*** This is a Security Bloggers Network syndicated blog from The Shared Security Show authored by Tom Eston. Read the original post at: https://sharedsecurity.net/2020/09/29/targeted-attacks-part-2-pretexting-and-attack-development/

Recent Posts

Industrial Enterprise Operational Technology Under Threat From Cyberattacks

One in four industrial enterprises had to temporarily cease operations due to cyberattacks within the past year, suggesting operational technology…

29 mins ago

Linux Kernel Privilege Escalation Vulnerability (CVE-2024-1086) Alert

NSFOCUS CERT has detected that details and a proof-of-concept (PoC) tool for a Linux kernel privilege escalation vulnerability CVE-2024-1086, have…

4 hours ago

LockBit Hacker Sentenced To 4 Years Jail Plus Fined $860K

Recent reports about legal proceedings, a 34-year-old Russian-Canadian national, Mikhail Vasiliev, has been handed a sentence of almost four years…

5 hours ago

MSP Case Study: Infinite IT Elevates Customer’s Email Defense Capabilities with PowerDMARC MSP Program

Reading Time: 2 min Discover how Infinite IT transforms its email defense capabilities through the PowerDMARC MSP Program in this…

6 hours ago

Symmetry Systems Ramps Up Hybrid-Cloud Data Security with $15 Million Series A Funding

ForgePoint Capital and Prefix Capital Double-Down on Data Store and Object Security as Lead Investors Symmetry Systems, provider of cutting-edge…

11 hours ago

What is Threat Management?

Threat management is a process that is used by cybersecurity analysts, incident responders and threat hunters to prevent cyberattacks, detect…

14 hours ago