Social Engineering

Social Engineering

Security Boulevard's 5 Most Read Stories for the Week, July 9-13

Security Boulevard’s 5 Most Read Stories for the Week, July 9-13

A new week, a new crop of security stories. Last week, Privacy in Public Places, Fileless Malware, Spam Bots and Fake Accounts and Cryptomining Worm MassMiner made headlines. Also, we offered some ...
Security Boulevard
dubai_bw.jpg

Recon for Social Engineering, Par Excellence

Lisa Forte, a Partner at UK based Red Goat Cyber Security, regales us with a tremendous blog post - detailing, if you will, the effort expended in executing reconnaissance targeting the focus ...
Free Yourself from FUD

Free Yourself from FUD

Fear, uncertainty, and doubt (FUD) hold powerful influence over humans. Fear itself is a deeply powerful emotion that causes specific reactions in the brain, and uncertainty and doubt are feelings that manipulate ...
Credential Phishing – Easy Steps to Stymie Hackers

Credential Phishing – Easy Steps to Stymie Hackers

Phishing attacks have become a common factor in our daily routines for businesses and in our personal lives. There are many different types of phishing attacks, each of which requires a slightly ...
Roger Clark of Silk Road

The Extradition He Thought Would Never Happen: Roger Clark of Silk Road

Roger Clark, the alleged right-hand man to Silk Road founder and owner Ross Ulbricht, was extradited to the United States earlier this month. His extradition quickly was followed by the unsealing of ...
Security Boulevard
Vulnerable to BEC Fraud

Are You Vulnerable to BEC Fraud?

In the security realm, the $64,000 question for many is, “Am I or is my company vulnerable to BEC fraud?” While that’s the money question, perhaps first question should be, “What is ...
Security Boulevard
WebApp Security, 'My Experience Leading A Purple Team'

WebApp Security, ‘My Experience Leading A Purple Team’

A terrific Red & Blue (in reality - Purple's the Word, in this case) Teaming Leadership post (via Robert A., posting on the Web Application Security Consortium List) detailing his experience leading ...

PSA: Recruitment portals and job sites at risk

We've warned job seekers to be wary of phishing attacks, and we're now doing the same for recruitment professionals: Beware of your recruitment portals, as they may play host to a lot ...
Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Bring Your Own Land (BYOL) – A Novel Red Teaming Technique

Introduction One of most significant recent developments in sophisticated offensive operations is the use of “Living off the Land” (LotL) techniques by attackers. These techniques leverage legitimate tools present on the system, ...
Facebook

The Shared Security Weekly Blaze – Ultrasonic Hard Drive Attacks, Dangerous USB Devices, Email Fraudsters Arrested

This is the Shared Security Weekly Blaze for June 18, 2018 sponsored by Security Perspectives – Your Source for Tailored Security Awareness Training and Assessment Solutions, Silent Pocket and CISOBox. This episode ...
Loading...