Let’s Go Vishing

VISHING

Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most successful methods of gaining information needed to breach an organization, even when used by an inexperienced attacker. When you can’t hack your way through your pentest, when you can’t break in with your red-team, Continue Reading >

Post-Cyber Monday survival

holiday_scams-100532824-carousel.idge

Congratulations! You survived Black Friday and Cyber Monday (personally, I’m holding out for “Free Cookies Friday”), but what now? You could sit back and enjoy your spoils of war, ahem, I mean shopping, or you could start a new tradition: Post-Cyber-Monday checklist. Sounds exciting, doesn’t it? Maybe it’s not up there with “Free Cookie Friday” Continue Reading >

Danger: Dopamine Addiction

il_340x270.600637724_m4jv

People like to be appreciated and know they are good at what they do. This goes for social engineering pentesters, too. We are contracted to think like the bad guys but are actually the good guys. This means we don’t post the details of a cool hack we found to get through a specific organization’s Continue Reading >