BishopFox, to random

Level up your web testing with the ! Listen in to our live discussion with our security consultant Shanni Prutchi as she shares her expertise, happening here later today!

Join us & bring your ASVS questions.

And don't forget about our Discord AMA starting at 1 PM MST.

https://bfx.social/4601Aqt

ChristinaLekati, to OSINT

Last Call For Registrations!
In 2 weeks we will be meeting in Vienna for a deep dive into & !

You can still join the 2-day training class "Practical Social Engineering & Open-source Intelligence for Security Teams" I will be delivering at this year's conference, in which you will...

🌐 Learn how attackers leverage OSINT to identify organizational vulnerabilities.
🎯 Understand the psychology and methodology behind social engineering attacks.
🔍 Acquire necessary skills & knowledge that will help you prevent and better simulate social engineering attack scenarios.
💼 Examine real-life case studies and attack methodologies.
📚 Build better protective measures, inform your security strategy, and learn to provide realistic insights to clients.

Date: 14 & 15 November 2023
Location: Vienna, Austria

⬇️ Course Content & Registration Details: https://deepsec.net/speaker.html#WSLOT626

I look forward to seeing you there!

ChristinaLekati, to Cybersecurity

It appears that the ALPHV ransomware group is behind MGM Resorts' cyberattack on Monday. The way they reportedly gained initial access is by looking into the MGM employees on LinkedIn, picking one, and then calling the Help Desk.

The ALPHV group is said to be "extremely skilled at social engineering".

Yet finding information on an organization's employees on LinkedIn & and then using it in a vishing attack, often impersonating that individual, is a frequent and rather standard practice in #vishing attacks.

I have seen first-hand that there is a need to improve in a few areas:

🔹 Few organizations are prepared to handle phone-based social engineering. Most companies focus almost entirely on #phishing attack simulations.
That allows blind spots and a lack of processes/preparedness in too many other areas like vishing, social media and SMS-based attacks among other things.

🔹 Having a proper identity verification process in place and training your employees to stick with it often mitigates a lot of vishing/impersonation attacks.
Yet in most cases, there is either a lack of verification process or the employees are not aware of it (they sometimes get trained on it once during onboarding, and then forget all about it).

🔹 Understanding that social engineering is not limited to email attacks. It is a serious threat, and it requires working on a comprehensive social engineering prevention protocol.

We are still waiting for more information on the exact methodology. But it won't be the last time we hear of a similar attack scenario.

News Reporting:

https://cybernews.com/security/mgm-cyberattack-claimed-alphv-blackcat-ransomware-group/

#socialengineering #cybersecuritytraining #cybersecurity #cyberattack #cybernews #infosec #infosectraining #ransomeware

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • mdbf
  • ethstaker
  • magazineikmin
  • cubers
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • tacticalgear
  • modclub
  • normalnudes
  • ngwrru68w68
  • cisconetworking
  • tester
  • GTA5RPClips
  • Leos
  • anitta
  • provamag3
  • lostlight
  • All magazines