Social Engineering

Social Engineering

How Social Engineering works

Psychological Manipulation in Social Engineering: Unveiling the Tactics

Have you ever found yourself in a situation where you felt like someone was trying to manipulate you into doing something you didn’t want to do? Perhaps it was a friend, family ...
PRC flag

China Breaches Microsoft Cloud — Spied on US Govt. Email

Storm-0558 Brewing: Multiple Microsoft failures cause data leaks at State and Commerce depts., plus 23 other orgs ...
Security Boulevard
Special report: Fighting fraud in the age of AI and automation

Special report: Fighting fraud in the age of AI and automation

See findings from Sift’s Q2 2023 Digital Trust & Safety Index, which includes data and insights on how AI and automation are changing the scope of fraud. The post Special report: Fighting ...
Vishing breaking down social engineering techniques

Vishing: Breaking Down Social Engineering Techniques

If you’ve read our past joint newsletter, you know that Curt and I (Shelby) approach vishing in a way that […] ...
Safe Security risk What’s Causing CISOs Stress

A Guide to Articulating Risk: Speaking the Language of the Stakeholder

The role of the modern CISO today is just as much about managing technical solutions as it is about communicating risk to key decision-making stakeholders. In their daily roles, most C-suite executives ...
Security Boulevard
Sowing Chaos and Reaping Rewards in Confluence and Jira

Sowing Chaos and Reaping Rewards in Confluence and Jira

IntroductionLet me paint a picture for you. You’re on a red team operation, operating from your favorite C2, and have just landed on a user’s workstation. You decide to take a look ...
Today’s cybersecurity health checks must identify AI-based threat risks. Does yours?

Today’s cybersecurity health checks must identify AI based threats. Does yours?

Your organization will most likely face AI based threats in cybersecurity at some point this year. And as such, you can’t rely on outdated risk assessment methodologies that struggle to keep pace ...
Vladimir Putin

Apple Fixes 0-Days — Russia Says US Used for Spying

Vulns unpatched for FOUR years: ‘Triangulation’ spyware said to use backdoor Apple gave to NSA ...
Security Boulevard