98 results found for the social eng
98 results found for the social eng:
Layer 8 Conference
TrustedSec is proud to sponsor and have a booth at this year's Layer 8 Conference! Plus, Principal Security Consultant Adam Compton with being giving a talk.
Dialing Into Deception: A Social Engineer's Playbook for Voice-Based Attacks
Join Targeted Operations Practice Lead Jason Lang and Senior Security Consultant David Boyd as they walk through different aspects of social engineering and ways you can bolster the human element of your defense.
Dragging Secrets Out of Chrome: NTLM Hash Leaks via File URLs
Drag a file, leak a hash. Learn how Chrome’s drag-and-drop API lets web apps initiate complex actions...and with some social engineering, it can also trigger NTLM hash leaks on Windows via SMB.
Hiding in the Shadows: Covert Tunnels via QEMU Virtualization
Attackers are getting increasingly creative—not just with their payloads, but with how they deliver and operate them. In a recent Incident Response engagement, TrustedSec investigated a case involving an attacker who used a combination of social…
Security Noise - CON Men: Wild West Hackin' Fest + GrrCON
On this episode of Security Noise, we are discussing two of our favorite cybersecurity conferences Wild West Hackin' Fest and GrrCON! Our team presented at both conferences this year on social engineering and pentesting.
Security Noise - Footprint Discovery for Red Teamers
On this episode of Security Noise, our team discusses footprinting and reconnaissance techniques for red teamers, including identifying a target's online presence, reconnaissance tools, methods, and social engineering.
Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach
Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of Microsoft Entra, 365, or Azure, we always emphasize protecting privileged user accounts.…
Policy as Code: Stop Writing Policies and Start Compiling Them
The Problem Nobody Wants to Talk AboutLet me paint a picture most security leaders will recognize.You have 30+ policies living as Word documents on SharePoint. Half of them have filenames like Acceptable_Use_Policy_FINAL_v3_revised_FINAL.docx.…
Dungeons and Daemons
Play Roll for Initiative. Hack the Planet.Dungeons & Daemons is a cybersecurity RPG that drops you into the boots of a Red Team operator on a live engagement. Your mission: infiltrate a corporate facility, compromise the domain, exfiltrate the…
Wild West Hackin' Fest 2025
We are excited to return to Wild West Hackin' Fest this year!