Differentiating Between Passive & Active Reconnaissance: 🌐Passive: Accessing publicly available information without direct interaction with a target or triggering security alerts 🌐Active: Involves engaging with a target directly. You become noticed and deal with higher risks.
Our Black Friday sale is here! Enjoy a 20% discount for our online class "Fundamentals of Cyber Investigations and Human Intelligence", with the code BLACKFRIDAY digital-trails.academy Valid from the 22nd-27th November (until Cyber Monday!)
Not too many deliveries make me jump off my chair, but this one certainly did! My new book arrived & I just can't wait to delve into its pages... We get to the core of how social engineering works (and how to thwart this threat) by getting to the core of human psychology and behavior.
Breaking- Cyber attacks hits the German Energy Agency (dena). As a result of the attack, Dena has been largely unable to work and cannot be reached by telephone or email since Tuesday. www.spiegel.de/netzwelt/net...
Eine wichtige deutsche Firma ist nach eigenen Angaben »technisch weitgehend arbeitsunfähig«: Wie die Deutsche Energie-Agentur selbst mitteilt, ist sie Ziel eines Hackerangriffs geworden.
This is highly recommended conference, for all the right reasons. If you want to gain fresh perspectives, insights, share & challenge your ideas, and meet some noteworthy industry professionals, make sure to attend.
I had heard the rumors and I am happy to report that they were true. Last week I had the pleasure of participating at the Swiss Cyber Storm as a speaker. It was one of THE most mentally stimulating conferences I have been to, a top shelf kind of conference for cybersecurity.
Microsoft published a new blog with an analysis of the TTPs of the Octo Tempest group (also known as 0ktapus or Scattered Spider), a financially motivated threat actor that relies heavily on #socialengineeringwww.microsoft.com/en-us/securi...
💼 Examine real-life case studies and attack methodologies. 📚 Build better protective measures, inform your security strategy, and learn to provide realistic insights to clients. I look forward to seeing you there!
In this class, you will get to: 🌐 Learn how attackers leverage OSINT to identify organizational vulnerabilities. 🎯 Understand the psychology and methodology behind social engineering attacks. 🔍 Acquire necessary skills & knowledge that will help you prevent attacks