98 results found for the social eng
98 results found for the social eng:
Red Teaming
Adversarial Attack Simulation, also known as Red Team, consists of conducting precision attacks against an organization in order to test the effectiveness and responsiveness of different parts of a security program.
Nick Doerner
Nick Doerner, a seasoned security consultant with 7+ years of experience, helps medical & financial organizations secure their networks against malicious threats.
David Boyd
EXPERIENCEDavid is a Security Consultant with 15+ years of experience in the technical industry. He specializes in Network Security and Penetration Testing, Vulnerability Assessments, Wireless Assessments, Physical Security Assessments, Firewall and…
Weaponization of Token Theft – A Red Team Perspective
This blog is the start of several deep dives into the weaponization of token theft. The focus of this blog will be on conditional access around devices and attacker behavior on compromising Microsoft 365 users. Ultimately, some conditions will give…
Protect Myself
Understand the threats of cybercrime, build simple security habits into your daily routine, and protect yourself and your organization from costly data breaches.
From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops
1.1 IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework that integrates retrieval-based models with generative AI to provide accurate and…
Common Mobile Device Threat Vectors
Mobile devices are a must have in today’s world for communication. With that being said, these devices do come with some risks when it comes to personal data. Common mobile device threat vectors include various attack methods and vulnerabilities…
Incident Response: Lessons From the Front Lines
IR Practice Lead Carlos Perez will draw from recent, anonymized investigations to expose the most devastating failure patterns our Incident Response team has encountered in the field.