An IBM Hacker Breaks Down High-Profile Attacks

On September 19, 2022, an 18-year-old cyberattacker known as “teapotuberhacker” (aka TeaPot) allegedly breached the Slack messages of game developer Rockstar Games. Using this access, they pilfered over 90 videos of the upcoming Grand Theft Auto VI game. They then posted those videos on the fan website GTAForums.com. Gamers got an unsanctioned sneak peek of […]

The post An IBM Hacker Breaks Down High-Profile Attacks appeared first on Security Intelligence.

Continue reading An IBM Hacker Breaks Down High-Profile Attacks

The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)

A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target.
The post The Benefits of Sock Puppets in Open-Source Intelligence (OSINT) first appeared on SecurityOrb.com. Continue reading The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)

Using Open-Source Intelligence for Mergers and Acquisitions

Mergers and acquisitions (M&A) have been challenging for IT and security teams for as long as businesses have relied on technology. Every company’s IT system is as unique as the company itself. Your business may run on commonly used tools and apps, and industry best practices to deploy and configure them. Nevertheless, these systems get […]

The post Using Open-Source Intelligence for Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Using Open-Source Intelligence for Mergers and Acquisitions

10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

Finding the Open Source Intelligence (OSINT) that affects your business or agency can help reduce your attack surface. You just have to find it first. Take a look at how OSINT works and how to secure it. According to the Office of the Director of National Intelligence, Open Source Intelligence (OSINT) “is publicly available information […]

The post 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software) appeared first on Security Intelligence.

Continue reading 10 Open-Source Intelligence Tools (That Actually Work With Your Existing Security Software)

350+ hackers hunt down missing people in first such hackathon

Organizers said 100 leads were generated every 10 minutes by contestants using OSINT – open-source intelligence such as online searches. Continue reading 350+ hackers hunt down missing people in first such hackathon

Social-Engineer Newsletter Vol 09 – Issue 116

In This Issue: “A Beginner’s Insight Into Vishing.” How can someone become a successful visher? Social-Engineer recently hired two team members who have been accumulating tremendous success. We interviewed them and we are sharing their insights with yo… Continue reading Social-Engineer Newsletter Vol 09 – Issue 116

Assess Your Risks

We talk a lot about phishing, vishing, smishing, and impersonation here at SECOM, and there is a good reason for that. Those are the primary services we provide as a company for our clients. Not all clients use all of our services, and some companies d… Continue reading Assess Your Risks

Free Facial Recognition Tool Can Track People Across Social Media Sites

Security researchers at Trustwave have released a new open-source tool that uses facial recognition technology to locate targets across numerous social media networks on a large scale.

Dubbed Social Mapper, the facial recognition tool automatically se… Continue reading Free Facial Recognition Tool Can Track People Across Social Media Sites

OSINT & External Recon Pt. 2: Contact Discovery – Tradecraft Security Weekly #26

During the reconnaissance phase of a penetration test being able to discover employee names and email addresses of an organization is extremely important. It is also important to do so as stealthily as possible. Using open-source techniques and tools i… Continue reading OSINT & External Recon Pt. 2: Contact Discovery – Tradecraft Security Weekly #26