The Social Engineer

Human Beings: The most easily exploitable aspect of security

No Detail Too Small – Intro

OSINT, Social Engineering /

What social engineer doesn’t love some good old fashion reconnaissance? As a social engineer, this initial stage of information gathering will make or break most engagements. As an Information Security Officer tasked with the job of keeping your organization safe and secure, it is important to understand just what malicious hackers are doing in order …

The Importance of the Pretext

Social Engineering /

More and more often hackers are relying on exploiting the human aspect of security to gain access to their targets through social engineering type attacks (e.g., phone, phishing, in-person, etc.). With strong firewalls, intrusion detection/prevention systems, and tools like security incident and event management (SIEM), you are seeing an increase in attacks that are targeting …