unica 02Social Engineering: The Art of Tricking PeopleHello People😁🤗. It’s good to see that you stopped by and wanted to learn something new. You should always learn new stuff and explore.6h ago
InNerd For TechbyTaylor ArmerdingGoing to the Olympics? Don’t let cybercriminals win the gold — from youThe Olympics are supposed to be fun and exciting. But the danderous reality is that everyone there will be the targets of cybercriminals.Jul 15
Muhammad ShahzaibSocial Engineering The Art of Human HackingWhile technology has been crucial in safeguarding against ransomware, phishing, and malware, human error is normally the weakest link…4d ago224d ago22
Ondra RojčíkThe XZ Backdoor: Unveiling the Elaborated Social Engineering Tactics of a Persistent Threat ActorThe XZ Backdoor incident highlights a significant infiltration of a critical open-source project through sophisticated social engineering…4d ago4d ago
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6Mar 6
unica 02Social Engineering: The Art of Tricking PeopleHello People😁🤗. It’s good to see that you stopped by and wanted to learn something new. You should always learn new stuff and explore.6h ago
InNerd For TechbyTaylor ArmerdingGoing to the Olympics? Don’t let cybercriminals win the gold — from youThe Olympics are supposed to be fun and exciting. But the danderous reality is that everyone there will be the targets of cybercriminals.Jul 15
Muhammad ShahzaibSocial Engineering The Art of Human HackingWhile technology has been crucial in safeguarding against ransomware, phishing, and malware, human error is normally the weakest link…4d ago22
Ondra RojčíkThe XZ Backdoor: Unveiling the Elaborated Social Engineering Tactics of a Persistent Threat ActorThe XZ Backdoor incident highlights a significant infiltration of a critical open-source project through sophisticated social engineering…4d ago
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6
0x0vidAnatomy of a crypto scam: ChatGPT Eth sniper bottl;dr — don’t go around pasting code you found on the internet into your smart contractsAug 182
Zayne HarbisonSocial Engineering Is Illegal, Until It’s NotDecember 7, 2024 | By: Zayne Harbison6d ago