COVID-19 vaccine

The Targeting of the COVID-19 Vaccine Supply Chain

The world has waited for 10 months for the good news that arrived this week—the first inoculations of the COVID-19 vaccine would be given in the UK within days. Those same 10 ...
Security Boulevard
Holiday Shopping Scams and Tips to Stay Safe

Holiday Shopping Scams and Tips to Stay Safe

In our November monthly episode we discuss the scams that you may encounter this holiday shopping season due to the pandemic and our top tips on how to stay safe and more ...
Def Con 28 SECTF4Kids Minecraft Competition

DEF CON® Kids: Preparing Them for the Future

Find out how we managed the DEF CON® Kids SECTF in an all virtual setting using the most popular game on the planet — Minecraft. The post DEF CON® Kids: Preparing Them ...
The Danny Ocean of Social Engineer's

The Danny Ocean of Social Engineer’s

In This Issue, "The Danny Ocean of Social Engineer's." Shelby Dacko, Human Risk Analyst with Social‐Engineer, LLC., shares her story of entering the field of professional social engineering. The post The Danny ...
Targeted Attacks Part 3 - The Exploit

Targeted Attacks Part 3 – The Exploit

In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice ...
Securing Devices at Home and Work

Securing Devices at Home and Work

It's National Cybersecurity Awareness Month! We're sharing tips to secure your devices at home and at work so that you can #BeCyberSmart. The post Securing Devices at Home and Work appeared first ...
Targeted Attacks Part 2 - Pretexting and Attack Development

Targeted Attacks Part 2 – Pretexting and Attack Development

In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests ...
SMishing Attack

SMishing Attacks Masquerading as USPS and FedEx

The USPS SMishing attack is a fast-moving, constantly changing credential stealing, social engineering phishing campaign. SlashNext Labs first detected and blocked it in May 2020 ...
Active Listening

Active Listening: The Secret to Any Successful Negotiation

Would you like to improve your negotiating skills? In this month's blog, find out how active listening is the secret to any successful negotiation. The post Active Listening: The Secret to Any ...
data security

COVID-19 Leads to Greater Consumer Awareness of Data Security

It turns out that IT departments and business leaders aren’t the only ones concerned about the impact of COVID-19 and remote work on data security. The average American has a heightened awareness ...
Security Boulevard