This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The post The Business Value of the Social-Engineer Phishing Service appeared first on Security Boulevard. Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an.
The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a socialengineering kill-chain and how can this help understand and prevent attacks, and new research shows 33 out of the top 100 hospitals in America […].
Socialengineering has become a larger threat to the healthcare industry in recent years. Clearly, we need to take notice of how socialengineering attacks are targeting our vital healthcare systems. So, what exactly is socialengineering? What is SocialEngineering? In one case, $3.1
The post Shortage of InformationSecurity Professionals appeared first on Security Boulevard. In recent years, there has been an exponential increase in high-profile data breaches. As data breaches at corporations, educational institutions, and government agencies continue to grow, so does the need.
The post BSides Vancouver 2021 – Savannah Lazzara’s ‘SocialEngineering: Tactics And Techniques’ appeared first on Security Boulevard. Our thanks to BSides Vancouver for publishing their outstanding BSides Vancouver 2021 Conference videos on the groups' YouTube channel.
In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from socialengineering anecdotes involving Kevin Johnson to Alyssa’s journey in aviation and being a pilot.
The post BSidesAugusta 2021 – Timothy De Block’s ‘SocialEngineering The Development Team For Better Security’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
Suddenly, it occurred to me, "Hey, you know what we really need is a new sub-field that combines all aspects of security behavior design, such as security awareness, anti-phishing, socialengineering, and even UEBA." Well, low-and-behold, it already exists! release, expected sometime soon).
Using the Easy Button™ Last month, we posted our blog explaining the staffing shortage in the informationsecurity (InfoSec) industry. The post Fixing the Shortage of InformationSecurity Professionals appeared first on Security Boulevard. It can often take three to six months to fill.
Since 2007 the InfoSec industry has been talking about TheBigOne™—the event that would change cyber threats from annoyances to existential concerns. They called it Cyber Pearl Harbor. This doesn’t mean it can’t still happen. Nowhere near fast enough.
The post DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones appeared first on The Shared Security Show.
Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily socialengineering attacks and extorting businesses large and small with ransomware. For more information, check out our on-demand webinar Your Zero Trust Roadmap.
Prior to Mastercard, Abdullah was the chief informationsecurity officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.
But what might they offer the front-facing informationsecurity officer – someone with a ten-year plan, wondering what to prepare for down the line? AI could impact more than just socialengineering. (Photo by Mario Tama/Getty Images).
Threat Intelligence (TI) representation across different levels There is a lot of information on cyberattacks on the internet, and, as a rule, the most helpful information is contained in cyber threat reports ( Threat Intelligence Reports ). Highlighting the AI advantages in ITSM and InfoSec, you can use ChatGPT.
ISACA’s new publication, AI Uses in Blue Team Security , looks at AI, ML and DL applications in cybersecurity to determine what is working, what is not, what looks encouraging for the future and what may be more hype than substance. It has a presence in 188 countries, including more than 220 chapters worldwide.
While being “classic” and “timeless” might work in other industries, informationsecurity (Infosec) must constantly guard against resting on laurels when it comes to strategies and solutions. Cybercrime also has elements where automated remediation is unavailable, such as socialengineering attacks.
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation.
As we look forward into 2017 cyber attacks , informationsecurity teams have to think like hackers in order to stay ahead of the challenges to come. SocialEngineering and Human Error Security experts can hardly say it enough: humans are your biggest cybersecurity vulnerability.
The Verizon 2020 DBIR report is out again – [link] – and most of the informationsecurity industry is busy reading and analyzing it cover to cover. I am sure all my infosec colleagues analyzed the report cover-to-cover and more specifically from the incident response and intrusion detection perspective.
The post DEF CON 29 Red Team Village – Russ Hanneman’s ‘Message About The Red Team Village CTF’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
This forced security leaders and enterprise executives to assess their informationsecurity operations and overall cybersecurity posture to ensure their organizations were ready to face the challenges ahead. Needless to say, in 2021 cybersecurity was front and center for individuals, enterprises, and governments alike.
The LAPSUS$ hacking group has claimed to have hacked both Microsoft and Okta, details about a novel phishing technique called a browser-in-the-browser (BitB) attack, and how a popular software package that has 1.1
The post Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware appeared first on The Shared Security Show. Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”.
To quote an excellent talk from Billy Boatright (and Babe Ruth) at the SocialEngineering Village several years ago, If youre good enough to have a bat in your hands, youre good enough to swing it. We will keep this in mind throughout the interviews and will do our best to alleviate those concerns. So, swing for thefences!
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.
The post Robert Kerbeck Author of RUSE: Lying the American Dream from Hollywood to Wall Street appeared first on The Shared Security Show. In this episode learn all about the world of corporate spying from someone who was a corporate spy and actually wrote a book on it!
Find out why this file may not be as significant as it seems and the importance of avoiding password reuse. […] The post Authy Breach: What It Means for You, RockYou 2024 Password Leak appeared first on Shared Security Podcast. We also explore a massive password list leak titled ‘Rock You 2024’ that has surfaced online.
Then they switch to the best practices to prevent social media account takeovers, highlighting […] The post The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked appeared first on Shared Security Podcast.
Co-host Scott Wright joins the discussion, highlighting how millions of AT&T customer account passcodes, along with personal information, were compromised due to a leak discovered by a security researcher and reported by […] The post Massive AT&T Data Leak, The Danger of Thread Hijacking appeared first on Shared Security Podcast.
Finally, we […] The post The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15 appeared first on Shared Security Podcast. In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs.
In informationsecurity (infosec) there is the need to be on the latest version. Being a system administrator, a patch could contain a security update to stop a vulnerability. Writing exploits or developing infosec tools is no exception, they often need to have access to the latest libraries.
In episode 346, we discuss new AI-driven voicemail scams that sound convincingly real and how to identify them. We also explore recent research on the privacy concerns surrounding donations to political parties through their websites.
In episode 330 Tom, Scott, and Kevin discuss the new features for iPhones and Android phones designed to warn users about secret trackers, possibly aiding in identifying stalkers.
They share their expertise on the key data and workflow hurdles that security teams face today. [] The post Tackling Data Overload: Strategies for Effective Vulnerability Remediation appeared first on Shared Security Podcast.
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint or network.
The post DEF CON 29 Red Team Village – ‘CTF Day 3’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
In this episode, Tom shows off AI generated images of a “Lonely and Sad Security Awareness Manager in a Dog Pound” and the humorous outcomes. The conversation shifts to Apple’s upcoming support for Rich Communication Services (RCS) and the potential security implications.
Janet Jackson’s “Rhythm Nation” has been recognized as an exploit for a vulnerability after Microsoft reported it can crash the hard drives of certain old laptop computers, phishing attacks that compromise credentials using brand impersonation are on the rise, and details about a new privacy focused phone carrier that doesn’t track your location or (..)
This week we discuss the top 3 location tracking apps in the Apple App Store and Google Play and which ones sell your data. Plus, details about recent fake Chick-fil-A and Olive Garden vouchers on Facebook. ** Links mentioned on the show ** #1 Phone Tracker by Number [link] [link] – Android [link] – iOS […].
Fifteen years after the launch of the microblogging social media platform, Twitter remains a dominant public forum for instant communication with individuals and organizations worldwide on a universe of topics, including #cybersecurity. How to screen for natural infosec talent: Ask for a worst case scenario for any common situation.
The post DEF CON 29 Red Team Village – ‘CTF Recap and Upcoming Events’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their outstanding DEF CON 29 Red Team Village videos on the Conferences’ YouTube channel.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content