Skip to Main Content

98 results found for the social eng

98 results found for the social eng:

SET v1.1 Codename: "Happy Holidays" Released

Unlock the latest Social-Engineer Toolkit version 'Happy Holidays' with new Metasploit-based attacks, optimizations, and UPX support, enhancing your toolkit's functionality and efficiency.

https://trustedsec.com/blog/set-v1-1-codename-happy-holidays-released

Three Most Common Physical Security Flaws (and How to Fix Them)

This expert reveals the most common physical security vulnerabilities and provides actionable patches to strengthen your organization's defenses, protecting against social engineering, hardware flaws, and more.

https://trustedsec.com/blog/three-most-common-physical-security-flaws-and-how-to-fix-them

NFT Crime: From the Simple to the Ingeniously Simple

Bored Ape Yacht Club NFT theft highlights the growing threat of cryptocurrency scams, including rug pulls, social engineering, and wash trading, posing risks to investors and potentially funding terrorist activities.

https://trustedsec.com/blog/nft-crime-from-the-simple-to-the-ingeniously-simple

PHYSICAL SECURITY ASSESSMENT DOCUMENTATION

This is a collection of legal wording and documentation created to be a template for others to use and to protect themselves when conducting physical security assessments.

https://trustedsec.com/resources/tools/physical_security_assessment_documentation

Justin Elze

Justin Elze, Chief Technology Officer at TrustedSec, leverages 8+ years of InfoSec expertise to protect technology infrastructure and share thought leadership in cybersecurity.

https://trustedsec.com/team-members/justin-elze

Paul Koblitz

Meet Paul Koblitz, Director of Technical Services at TrustedSec, leveraging extensive security expertise & experience in physical & social engineering to protect businesses.

https://trustedsec.com/team-members/paul-koblitz

David Kennedy

“Security expert, keynote speaker, avid gamer, and the go-to for protecting companies from threats.”David is a subject matter expert in cybersecurity with over 19 years of experience, whose career has ranged from a Chief Security Officer (CSO) for a…

https://trustedsec.com/team-members/david-kennedy

JS-Tap: Weaponizing JavaScript for Red Teams

Red teamers can use JS-Tap to collect user inputs, screenshots, and network data from web applications without prior knowledge, simplifying red teaming and expanding attack opportunities.

https://trustedsec.com/blog/js-tap-weaponizing-javascript-for-red-teams

Clickjacking: Not Just for the Clicks

Learn how to exploit drag-input clickjacking vulnerabilities in web applications to perform malicious actions, and see a proof-of-concept demonstration of this technique in action.

https://trustedsec.com/blog/clickjacking-not-just-for-the-clicks

Unmasking Business Email Compromise: Safeguarding Organizations in the Digital Age

Business Email Compromises (BEC) within the Microsoft 365 environment are a large threat with nearly $500 Million reported in stolen funds in 2022[1]. Attackers are targeting both company and personal email accounts. It’s important to understand how…

https://trustedsec.com/blog/unmasking-business-email-compromise-safeguarding-organizations-in-the-digital-age
Prev 4 5 6 7 8 9 10 Prev