What comes after the huffing and puffing?


In the midst of all the recent articles about information breaches, a trend is emerging. We seem to be hearing more lately that prevention of breaches, while not to be ignored, should not be the sole focus of digital or physical security programs. More news articles, tweets from the infosec community, and even commercial products are talking about the importance of detection and response. Continue Reading >

Implicit Bias – Chances Are, You Have One


Here’s an oldie but goodie. A man and his son are in a serious car accident and both are taken to the emergency room, unconscious. The boy is wheeled immediately into surgery. The surgeon takes one look at him and says, “I can’t operate on this child, he’s my son.” Who is the surgeon?

Let’s Go Vishing


Vishing, or eliciting information over the phone, is a common social attack vector. It’s proven to be one of the most successful methods of gaining information needed to breach an organization, even when used by an inexperienced attacker. When you can’t hack your way through your pentest, when you can’t break in with your red-team, Continue Reading >

Post-Cyber Monday survival


Congratulations! You survived Black Friday and Cyber Monday (personally, I’m holding out for “Free Cookies Friday”), but what now? You could sit back and enjoy your spoils of war, ahem, I mean shopping, or you could start a new tradition: Post-Cyber-Monday checklist. Sounds exciting, doesn’t it? Maybe it’s not up there with “Free Cookie Friday” Continue Reading >

Danger: Dopamine Addiction


People like to be appreciated and know they are good at what they do. This goes for social engineering pentesters, too. We are contracted to think like the bad guys but are actually the good guys. This means we don’t post the details of a cool hack we found to get through a specific organization’s Continue Reading >



As sophisticated, targeted attacks become increasingly prevalent, today’s organizations are being challenged, now more than ever.  In effort to shed light on the nature of these types of attacks, Social-Engineer hosts an annual Social Engineering Capture the Flag (SECTF) competition at the DEF CON hacking conference in Las Vegas.  At this conference the security elite Continue Reading >

DerbyCon 4.0 – Family Rootz


“This is DerbyCon” where the final words echo’ed in a very emotional closing video that David Kennedy put together for the ending of the DerbyCon 4.0 Conference. Its a con… why would it affect anyone so strongly?  Don’t we all just go to these things to see new hacks, spend some quality time with beer Continue Reading >