Skip to Main Content

98 results found for the social eng

98 results found for the social eng:

Red Teaming

Adversarial Attack Simulation, also known as Red Team, consists of conducting precision attacks against an organization in order to test the effectiveness and responsiveness of different parts of a security program.

https://trustedsec.com/services/red-teaming

Nick Doerner

Nick Doerner, a seasoned security consultant with 7+ years of experience, helps medical & financial organizations secure their networks against malicious threats.

https://trustedsec.com/team-members/nick-doerner

David Boyd

EXPERIENCEDavid is a Security Consultant with 15+ years of experience in the technical industry. He specializes in Network Security and Penetration Testing, Vulnerability Assessments, Wireless Assessments, Physical Security Assessments, Firewall and…

https://trustedsec.com/team-members/david-boyd

Weaponization of Token Theft – A Red Team Perspective

This blog is the start of several deep dives into the weaponization of token theft. The focus of this blog will be on conditional access around devices and attacker behavior on compromising Microsoft 365 users. Ultimately, some conditions will give…

https://trustedsec.com/blog/weaponization-of-token-theft-a-red-team-perspective

Protect Myself

Understand the threats of cybercrime, build simple security habits into your daily routine, and protect yourself and your organization from costly data breaches.

https://trustedsec.com/protectmyself

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops

1.1      IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework that integrates retrieval-based models with generative AI to provide accurate and…

https://trustedsec.com/blog/from-rags-to-riches-using-llms-and-rags-to-enhance-your-ops

Common Mobile Device Threat Vectors

Mobile devices are a must have in today’s world for communication. With that being said, these devices do come with some risks when it comes to personal data. Common mobile device threat vectors include various attack methods and vulnerabilities…

https://trustedsec.com/blog/common-mobile-device-threat-vectors

Incident Response: Lessons From the Front Lines

IR Practice Lead Carlos Perez will draw from recent, anonymized investigations to expose the most devastating failure patterns our Incident Response team has encountered in the field.

https://trustedsec.com/resources/webinars/incident-response-lessons-from-the-front-lines
Prev 7 8 9 10