Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Introduction One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These techniques leverage legitimate tools present on the system, ...
Facebook

The Shared Security Weekly Blaze – Ultrasonic Hard Drive Attacks, Dangerous USB Devices, Email Fraudsters Arrested

This is the Shared Security Weekly Blaze for June 18, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions, Silent Pocket and CISOBox. This episode ...
Next-gen security with Windows Defender Antivirus

Machine learning vs. social engineering

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new ...
How does Caller ID Spoofing work? (BTSS)

PSA: Users with landlines are more vulnerable to scams

Anyone still using a home phone be warned: having landlines makes you particularly vulnerable to scams. Read on to learn how to keep your landline but stay safe from cyberattacks. Categories: Cybercrime ...
Social media: A treasure trove of spam and scams

Social media: A treasure trove of spam and scams

How do spammers know how to target you for scams? They use social media to produce the most convincing types of spam. Categories: Cybercrime Social engineering Tags: login credentialsnigerianphishphishingPieter Arntzsocial mediaspam (Read ...
A conversation with America Geeks

A conversation with America Geeks

We first published on tech scammers America Geeks back in 2015 and again in 2016. This time, they opened a help ticket with us, requesting we take down our blog post—which warranted ...
Instagram story spam claims free Apple Watch

Instagram story spam claims free Apple Watch

We take a look at Instagram story spam leading to a "free Apple Watch" giveaway on a recently compromised celebrity account. Categories: Social engineering Threat analysis Tags: Apple WatchInstagramscamsocial mediasocial networkspamsurveysurveys (Read ...
SEVillage - The Documentary

The SEVillage at Def Con 26

I know what you are thinking, “the Def Con 25 bus just finished running us over, it’s not possibly time for Def Con 26 is it?” My answer to you is, “yes, ...
Loading...