Threatlist: Manufacturing, a Top Target for Espionage

Vectra’s 2018 Spotlight Report found that attackers can easily spy, spread and steal information, largely unhindered by the insufficient internal access controls that are in place. Continue reading Threatlist: Manufacturing, a Top Target for Espionage

Recon for Social Engineering, Par Excellence

Lisa Forte, a Partner at UK based Red Goat Cyber Security, regales us with a tremendous blog post – detailing, if you will, the effort expended in executing reconnaissance targeting the focus of a social engineering mission. Quite likely the best pros… Continue reading Recon for Social Engineering, Par Excellence

What is the reason why I am not able to able to use Maltego unless I disable port 135 (RPC) inbound on my Windows computer?

I originally attempted to use Maltego before making any configuration changes to my firewall; however, I was being blocked because I had port 135 disabled which is what Windows uses for RPC. After disabling the inbound rule, … Continue reading What is the reason why I am not able to able to use Maltego unless I disable port 135 (RPC) inbound on my Windows computer?

Robert M. Lee & Jeff Hass’s ‘Little Bobby – Preparatory Action’

via the comic superiority of Robert M. Lee and the superb illustration work of Jeff Hass at Little Bobby Comics
Permalink
The post Robert M. Lee & Jeff Hass’s ‘Little Bobby – Preparatory Action’ appeared first on Security B… Continue reading Robert M. Lee & Jeff Hass’s ‘Little Bobby – Preparatory Action’