"handoff, like, as a pen tester, i genuinely hope that my report gets handed to as many people as possible in as many different formats as possible. not necessarily like the general public, obviously, but at inside a company. one of my favorite things is getting an email from a ra…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
40%
"got a phishing campaign tool like knowbefore. is that social engineering or is that something different? how would i understand the differences between these products? corey ham i think it is. and i think that ’ s a key thing that pretty much every organization should have. right…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
36%
"a person falling victim to a social engineering attack or making an error error. so this is. data breaches can result from misconfigurations or social engineering, but there ’ s human elements to both. like what? well, like someone falling victim to a phishing attack or like, the…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
31%
"t even know that you are vulnerable before you ended up with a data breach. which, we ’ re speculating here. but i would suspect that in a non, a significant amount of cases that organizations were exploited with vulnerabilities they didn ’ t know, even existed. so i think that ’…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
This webcast originally aired on February 27, 2025. Join us for a very special free one-hour Black Hills Information Security webcast with Corey Ham & Kelli Tarala on why your […]