In This Issue: “What is Your Favorite OSINT Tool?” Ryan MacDougall, an OSINT trainer and speaker on the topic, answers how and when to choose and use tools for an investigation.
In This Issue: “Cyber Threats – Are You Trained to Deal with Them?” The cyber threat landscape continues to evolve. Cyber security awareness training must continue to evolve as well. Find out what makes an effective training program that both the organization and the employees benefit from.
In This Issue: “Spread The Word on Elder Fraud.” This month, we are going to talk about social engineering scams and how they target the elderly population.
Will you become the next cryptocurrency millionaire? After all, if an 11-year-old can do it, how difficult can it be? For thousands of people in northwestern China their opportunity had arrived, or so they thought, in a new cryptocurrency called ‘Datang Coin.’
Social-Engineer.org (SEORG) has been hosting the SECTF event for the past eight years. Join us as we look back and review SECTF at DEF CON 2010-2017
Have you locked down your accounts? Malicious attackers are searching for information on social media platforms such as Facebook and LinkedIn. Find out what we can learn from Cobalt Gypsy’s created persona ‘Mia Ash’.
In This Issue: “Gaining Access – A New Way of Thinking at APSE.” Get an inside look into the 5 day APSE course designed and written by Chris Hadnagy.
In This Issue: “A Request By Any Other Name.” Sometimes the quickest route to a goal isn’t to come at it head-on. Find out how social engineers use the the power of social cognition to curate favorable context.