Social-Engineer Newsletter Vol 09 – Issue 116

Social-Engineer Newsletter Vol 09 – Issue 116

In This Issue: "A Beginner's Insight Into Vishing." How can someone become a successful visher? Social-Engineer recently hired two team members who have been accumulating tremendous success. We interviewed them and we ...
Mặt nạ "sinh đôi nhân tạo" của Bkav đánh bại Face ID: Không dùng Face ID trong giao dịch thương mại

Social-Engineer Newsletter Vol 09 – Issue 114

In This Issue: "Smile, Facial Recognition in Use." Facial recognition software has been growing in popularity with companies and government agencies throughout the world. Can this technology be easily circumvented and used ...
Assess Your Risks

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for ...
NetworkMiner 2.4

NetworkMiner 2.4 Released

We are proud to announce the release of NetworkMiner 2.4 today! The new version comes with several improvements, such as username extraction from Kerberos traffic, better OS fingerprinting and even better Linux ...
The SEVillage Wrap-up from DEF CON 26

The SEVillage Wrap-up from DEF CON 26

The Social-Engineer team is collectively wrapping up their annual post-DEF CON foggy state, unburying from their backlog, and reminiscing on the amazingness that was the SEVillage at DEF CON 26. Can we ...
CapLoader 1.7 logo

CapLoader 1.7 Released

We are happy to announce the release of CapLoader 1.7! Here's an overview of what's new in this release: Regular expression searchingLookup of IP addresses using online servicesLookup of domain names using ...
Vendors, Educating, and Social Media Marketing

Vendors, Educating, and Social Media Marketing

What do professionals inadvertently disclose about the operations security (OPSEC) of their organizations and themselves while giving advice? Becoming a known educator and voice in your area of expertise is effectively done ...
SNMP Community Strings in NetworkMiner's Credential tab

NetworkMiner 2.3 Released!

The free and open source network forensics tool NetworkMiner now comes with improved extraction of files and metadata from several protocols as well as a few GUI updates. But the biggest improvements ...
Are You Being Vigilant Against a Dumpster Diving Attack?

Are You Being Vigilant Against a Dumpster Diving Attack?

When one thinks of Open Source Intelligence (OSINT) things like Facebook, court records, and Google-fu typically come to mind. However, a skilled reconnoiter will also utilize the contents of your trash when ...
Loading...