Skip to Main Content

98 results found for the social eng

98 results found for the social eng:

Layer 8 Conference

TrustedSec is proud to sponsor and have a booth at this year's Layer 8 Conference! Plus, Principal Security Consultant Adam Compton with being giving a talk.

https://trustedsec.com/about-us/events/layer-8-conference

Dialing Into Deception: A Social Engineer's Playbook for Voice-Based Attacks

Join Targeted Operations Practice Lead Jason Lang and Senior Security Consultant David Boyd as they walk through different aspects of social engineering and ways you can bolster the human element of your defense.

https://trustedsec.com/resources/webinars/dialing-into-deception-a-social-engineers-playbook-for-voice-based-attacks

Dragging Secrets Out of Chrome: NTLM Hash Leaks via File URLs

Drag a file, leak a hash. Learn how Chrome’s drag-and-drop API lets web apps initiate complex actions...and with some social engineering, it can also trigger NTLM hash leaks on Windows via SMB.

https://trustedsec.com/blog/dragging-secrets-out-of-chrome-ntlm-hash-leaks-via-file-urls

Hiding in the Shadows: Covert Tunnels via QEMU Virtualization

Attackers are getting increasingly creative—not just with their payloads, but with how they deliver and operate them. In a recent Incident Response engagement, TrustedSec investigated a case involving an attacker who used a combination of social…

https://trustedsec.com/blog/hiding-in-the-shadows-covert-tunnels-via-qemu-virtualization

Security Noise - CON Men: Wild West Hackin' Fest + GrrCON

On this episode of Security Noise, we are discussing two of our favorite cybersecurity conferences Wild West Hackin' Fest and GrrCON! Our team presented at both conferences this year on social engineering and pentesting.

https://trustedsec.com/resources/podcasts/security-noise-con-men-wild-west-hackin-fest-grrcon

Security Noise - Footprint Discovery for Red Teamers

On this episode of Security Noise, our team discusses footprinting and reconnaissance techniques for red teamers, including identifying a target's online presence, reconnaissance tools, methods, and social engineering.

https://trustedsec.com/resources/podcasts/security-noise-footprint-discovery-for-red-teamers

Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach

Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of Microsoft Entra, 365, or Azure, we always emphasize protecting privileged user accounts.…

https://trustedsec.com/blog/managing-privileged-roles-in-microsoft-entra-id-a-pragmatic-approach

Policy as Code: Stop Writing Policies and Start Compiling Them

The Problem Nobody Wants to Talk AboutLet me paint a picture most security leaders will recognize.You have 30+ policies living as Word documents on SharePoint. Half of them have filenames like Acceptable_Use_Policy_FINAL_v3_revised_FINAL.docx.…

https://trustedsec.com/blog/policy-as-code-stop-writing-policies-and-start-compiling-them

Dungeons and Daemons

Play Roll for Initiative. Hack the Planet.Dungeons & Daemons is a cybersecurity RPG that drops you into the boots of a Red Team operator on a live engagement. Your mission: infiltrate a corporate facility, compromise the domain, exfiltrate the…

https://trustedsec.com/blog/dungeons-and-daemons

Wild West Hackin' Fest 2025

We are excited to return to Wild West Hackin' Fest this year!

https://trustedsec.com/about-us/events/wild-west-hackin-fest-2025-2-2
Prev 6 7 8 9 10 Prev