John AlthouseIntroducing EVA — Employee Verification AppThe solution to Employee AI / Voice PhishingOct 141
Jason PuglisiAll Your Black Badge Are Belong to Me, and More Beep Boops from DEF CON 32I got a few cool ones this yearAug 11Aug 11
AkashyadavIVR (Interacting Voice Response) PhishingHello, fellow Hackers, In this write-up, we are going to get a detailed understanding of what IVR phishing is and how to avoid it.Oct 2, 2023Oct 2, 2023
LogixacademyVishing: voice-based social engineeringWe’ve all received one of those ridiculous emails trying to convince us to send money to the other side of the world. Maybe the wife of the…Apr 16Apr 16
John AlthouseIntroducing EVA — Employee Verification AppThe solution to Employee AI / Voice PhishingOct 141
Jason PuglisiAll Your Black Badge Are Belong to Me, and More Beep Boops from DEF CON 32I got a few cool ones this yearAug 11
AkashyadavIVR (Interacting Voice Response) PhishingHello, fellow Hackers, In this write-up, we are going to get a detailed understanding of what IVR phishing is and how to avoid it.Oct 2, 2023
LogixacademyVishing: voice-based social engineeringWe’ve all received one of those ridiculous emails trying to convince us to send money to the other side of the world. Maybe the wife of the…Apr 16
George ChenBanks, stop asking for verification when calling customersBank have a practice of asking for verification information when calling customers even while using unrecognised numbers. Should we…Aug 24, 2021
Aliasgar KanchinSystem WeaknessBeyond Phishing: Understanding and Mitigating Vishing ThreatsVishing is just a fancy term for a phishing scam over the phoneApr 15
Chris KirschTop OSINT sources and vishing pretexts from DEF CON’s social engineering competitionThis year, I was invited to be a judge for the vishing competition at the Social Engineering Community at DEF CON, the world’s largest…Sep 18, 2022