98 results found for the social eng
98 results found for the social eng:
SET v1.1 Codename: "Happy Holidays" Released
Unlock the latest Social-Engineer Toolkit version 'Happy Holidays' with new Metasploit-based attacks, optimizations, and UPX support, enhancing your toolkit's functionality and efficiency.
Three Most Common Physical Security Flaws (and How to Fix Them)
This expert reveals the most common physical security vulnerabilities and provides actionable patches to strengthen your organization's defenses, protecting against social engineering, hardware flaws, and more.
NFT Crime: From the Simple to the Ingeniously Simple
Bored Ape Yacht Club NFT theft highlights the growing threat of cryptocurrency scams, including rug pulls, social engineering, and wash trading, posing risks to investors and potentially funding terrorist activities.
PHYSICAL SECURITY ASSESSMENT DOCUMENTATION
This is a collection of legal wording and documentation created to be a template for others to use and to protect themselves when conducting physical security assessments.
Justin Elze
Justin Elze, Chief Technology Officer at TrustedSec, leverages 8+ years of InfoSec expertise to protect technology infrastructure and share thought leadership in cybersecurity.
Paul Koblitz
Meet Paul Koblitz, Director of Technical Services at TrustedSec, leveraging extensive security expertise & experience in physical & social engineering to protect businesses.
David Kennedy
“Security expert, keynote speaker, avid gamer, and the go-to for protecting companies from threats.”David is a subject matter expert in cybersecurity with over 19 years of experience, whose career has ranged from a Chief Security Officer (CSO) for a…
JS-Tap: Weaponizing JavaScript for Red Teams
Red teamers can use JS-Tap to collect user inputs, screenshots, and network data from web applications without prior knowledge, simplifying red teaming and expanding attack opportunities.
Clickjacking: Not Just for the Clicks
Learn how to exploit drag-input clickjacking vulnerabilities in web applications to perform malicious actions, and see a proof-of-concept demonstration of this technique in action.
Unmasking Business Email Compromise: Safeguarding Organizations in the Digital Age
Business Email Compromises (BEC) within the Microsoft 365 environment are a large threat with nearly $500 Million reported in stolen funds in 2022[1]. Attackers are targeting both company and personal email accounts. It’s important to understand how…