Skip to Main Content

98 results found for the social eng

98 results found for the social eng:

From Zero to Purple

Learn how to create and deploy Internet Shortcut files for adversary emulation and detection engineering using Python, SMB, and WebDAV servers, a useful tool for Purple Teams.

https://trustedsec.com/blog/from-zero-to-purple

Advanced Cloud Pen Testing Scenarios

Explore advanced cloud pen testing scenarios with expert insights from Paul Burkeland and Security Consultants Edwin David and Patrick Mayo, elevating your security game with innovative techniques and real-world attack s

https://trustedsec.com/resources/webinars/advanced-cloud-pen-testing-scenarios

Costa Petros

Costa Petros, a seasoned IT professional with a'security-first' approach, leverages his technical expertise and communication skills to deliver comprehensive security assessments and penetration testing solutions.

https://trustedsec.com/team-members/costa-petros

From Chaos to Clarity: Organizing Data With Structured Formats

1.1      IntroductionAbout a year ago, we introduced a logging utility into our internal tooling on the Targeted Operations team to standardize how we output data (as a bonus, this also served us aesthetically with pretty logs). This project was…

https://trustedsec.com/blog/from-chaos-to-clarity-organizing-data-with-structured-formats

Most Reported Web Findings of 2023

I reviewed the findings from the application and API assessments that the TrustedSec Software Security Team conducted during 2023 to see what issues we were seeing most often. I put them into categories that I thought would help identify trends…

https://trustedsec.com/blog/most-reported-web-findings-of-2023

Assumed Breach: The Evolution of Offensive Security Testing

Assumed Breach assessments simulate a compromised internal network, helping organizations strengthen security posture by identifying vulnerabilities and remediation opportunities in a realistic threat scenario.

https://trustedsec.com/blog/assumed-breach-the-evolution-of-offensive-security-testing

Specula - Turning Outlook Into a C2 With One Registry Change

There exist a few singular Registry changes that any non-privileged user can make that transform the Outlook email client into a beaconing C2 agent. Given that outlook.exe is a trusted process, this allows an attacker persistent access to a network…

https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change

Ask Me Anything: Advanced Cloud Pen Testing Scenarios

Join TrustedSec Force Cloud Security Practice Lead Paul Burkeland, along with Principal Security Consultant Mike Felch and Security Consultants Edwin David and Patrick Mayo, as they reveal key signs of attacker activity. They explain how an internal…

https://trustedsec.com/resources/webinars/ask-me-anything-advanced-cloud-pen-testing-scenarios

Not in My Domain: Preparing for Your Next Penetration Test

In this webinar, our experts will dig into best practices and common issues they identified during recent penetration testing engagements, the latest attack trends and how to mitigate them prior to your assessment.

https://trustedsec.com/resources/webinars/not-in-my-domain-preparing-for-your-next-penetration-test

NolaCon 2025

We are proud to sponsor and have a booth at this year's NolaCon!

https://trustedsec.com/about-us/events/nolacon
Prev 5 6 7 8 9 10 Prev