article thumbnail

5 Things Santa's Workshop Teaches Us About Cybersecurity Communications

SecureWorld News

But the awkward guilt of the clumsy patron revealed something about the real risks within the globally once-a-year supply chain that is Santa's Workshop. First, the camaraderie seen in the workshop creates a culture of connectedness, so if something is wrong or off, there is a high degree of trust that encourages internal communication.

article thumbnail

Weekly Update 141

Troy Hunt

We're talking about the event, upcoming ones, Scott's Hack Yourself First UK tour, some funky default values in EV certs and then we head off down a rabbit hole of 2FA and people getting fired for failing simulated phishing tests. Next one from London next week!

Phishing 156
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Weekly Update 195

Troy Hunt

References The next public "Hack Yourself First" workshop Scott Helme and I are doing is "in" Melbourne later next month (ok, so it's online like everything else now, but it's at an Asia Pacific friendly time) You should see the size of the data breach that literally landed on my doorstep!!!

IoT 192
article thumbnail

Social Engineering 2.0: The Rise of Deepfake Phishing

SecureWorld News

Cybercriminals have been quick to recognize and take advantage of these new capabilities, which has given birth to a new epoch of phishing called "deepfake phishing." The mechanics of deepfake phishing The way traditional phishing works is rather simple. Nowadays, being a successful "black hat" takes a lot of effort.

article thumbnail

Weekly Update 138

Troy Hunt

It's Minnesota this week and I've just wrapped up a couple of days of Hack Yourself First workshop followed by the opening keynote at NDC followed by PubConf. After a mammoth 30-hour door-to-door journey, I'm back in the USA!

article thumbnail

WHEN IS CYBERSECURITY IS WEEK

Hacker's King

Activities during this week include engaging workshops, informative webinars, and community events, all designed to empower individuals with the knowledge and skills necessary to navigate today’s cyber threats effectively. Be Cautious with Email Attachments: Phishing attacks often come disguised as legitimate emails.

article thumbnail

Stealing More SRE Ideas for Your SOC

Anton on Security

By the way, this is why the most common starter SOAR playbook is about phishing, a major time-suck of many aspiring SOCs (I’ve heard one spent 40% of analyst time on phishing response and that was after the email security gateway did its work). So people often point out that the value of automation is about saving time.