Targeted Attacks Part 3 – The Exploit

In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice Lead at TrustedSec. Make sure you watch the YouTu… Continue reading Targeted Attacks Part 3 – The Exploit

Targeted Attacks Part 2 – Pretexting and Attack Development

In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests Nathan Sweaney, Senior Security Consultant at Secure Id… Continue reading Targeted Attacks Part 2 – Pretexting and Attack Development

Is It Legit to Use Fear as Part of My Pretext?

One question I get asked often is, “Chris, isn’t it legit to use fear as part of my pretext in a social engineering exercise? I mean, after all, the bad guys are doing it. Wouldn’t it be realistic?”  Well I can’t argu… Continue reading Is It Legit to Use Fear as Part of My Pretext?