Webcast: Decrease Your Risk of a Data Breach - Effective Security Programs with Metasploit
Rapid7 Blog » Social Engineering
by
5M ago
Thanks for the many CISOs and security engineers who attended our recent webcast, in which I presented some practical advice on how to leverage Metasploit to conduct regular security reviews that address current attack vectors. While Metasploit is often used for penetration testing projects, this presentation focuses on leveraging Metasploit for ongoing security assessments that can be achieved with a small security team to reduce the risk of a data breach. This webcast is now available for o ..read more
Visit website
Using the tag to clone a web page for social engineering attacks
Rapid7 Blog » Social Engineering
by
5M ago
Social engineering campaigns can be a lot more effective if you can impersonate a well-known website that users trust. However, when you simply clone a website by cutting-and-pasting the page source and putting it on your own server, your links will stop working. Copying all links and images from the other site can be cumbersome, but there's an alternative: the HTML tag. It specifies a default address/target for all links on a page; it is inserted into the head element. Let's say you've ..read more
Visit website
Microsoft Patch Tuesday - November 2011
Rapid7 Blog » Social Engineering
by
5M ago
November's Microsoft Patch Tuesday contains four bulletins: one “critical”, two “importants”, and one “moderate”. The majority of these bulletins relate to Microsoft's later versions of the OS, implying that the flaws they address were possibly introduced with Windows Vista. Generally more vulnerabilities are found in earlier versions of the OS, so this month is unusual. The critical bulletin – MS11-083 – is a TCP/IP based, specifically UDP, vulnerability which affects Vista, Windows 7, Server ..read more
Visit website
Social Engineering: Would You Fall For This Phone Call?
Rapid7 Blog » Social Engineering
by
7M ago
Cyber criminals don't always need a keyboard to hack into your bank account or company network. In fact, a lot of attacks start with a simple phone call. Typically, the attackers are either trying to get information out of you or to make you do something. This is a technique they call social engineering. I've read a lot about social engineering over the years, since it's a personal area of interest. It can be used by a bunch off different occupations, such as FBI interrogators, con artists, sal ..read more
Visit website
How Cybercriminals Use Pinterest to Run Fraud Scams
Rapid7 Blog » Social Engineering
by
2y ago
There are a variety of scams hackers can run on Pinterest, but for this post, we’ll focus on fraud and financial scams ..read more
Visit website
How to Automate Identifying and Take Down Malicious Social Media Profiles
Rapid7 Blog » Social Engineering
by
2y ago
Here is how Rapid7 has automated the process of identifying and taking down fake social media profiles to help companies proactively identify these scams ..read more
Visit website
7 Funny and Punny Halloween Costume Ideas for Tech and Cybersecurity Pros
Rapid7 Blog » Social Engineering
by
2y ago
Stuck on what to be this year? Here are some of our favorite Halloween costume ideas for tech and cybersecurity professionals ..read more
Visit website
Top 4 Takeaways from the "Live Bait: How to Prevent, Detect, and Respond to Phishing Emails" Webcast
Rapid7 Blog » Social Engineering
by
2y ago
In this week's webcast,Lital Asher - Dotan [https://community.rapid7.com/people/lasherdotan] and ckirsch [https://community.rapid7.com/people/ckirsch] tackled the hot topic, “Live Bait: How to Prevent, Detect, and Respond to Phishing Emails [https://information.rapid7.com/prevent-detect-and-respond-to-phishing-emails.html?CS=blog] ”. Phishing has risen from #9 to #3 in the Verizon Data Breach Investigations Report on the most common attack vectors. Phishing attacks are often successful because i ..read more
Visit website
Whiteboard Wednesday: How to Implement A Phishing Awareness Training Plan in 5 Steps
Rapid7 Blog » Social Engineering
by
2y ago
There’s no silver bullet to combating protecting your organization from phishing attacks [https://www.rapid7.com/solutions/phishing-protection/] today. The only comprehensive approach leverages a combination of methods, many of which we’ve covered in parts 1 [https://www.rapid7.com/resources/wbw-anti-phishing/] and 2 [https://www.rapid7.com/resources/wbw-phishing-protection/] of our three-part phishing Whiteboard Wednesday series. Phishing is a human problem, and part of the solution is to prop ..read more
Visit website
Rapid7: Coming to a city near you
Rapid7 Blog » Social Engineering
by
2y ago
We're taking this show on the road. Literally. This week our multi-city Rapid7 roadshow event, “Security at the Crossroads,” kicked off in New York and Minneapolis. Industry experts and fellow practitioners – including speakers from Forrester, Cardinal Innovations Healthcare Solutions, Vertex Pharmaceuticals, Porter Airlines, and TriNet – gathered to share security stories, strategies, and best practices. There isn't enough room to share all the takeaways from these two events, but here are ..read more
Visit website

Follow Rapid7 Blog » Social Engineering on FeedSpot

Continue with Google
Continue with Apple
OR