It’s pretty common for companies to bundle social engineering into their penetration testing programs. But when the report shows up, you may find you’re surprised and frustrated at the rate of employees clicking links to open malicious documents. How were my employees so easily manipulated? And why didn’t anyone on the IT staff catch this? Don’t sweat it. Happens to more people than you can imagine. We’ve got guidance for three forms of remediation.
05 Oct 2020
- Launching a pentest: How to discover related DNS records
- Leveraging hijacked Slack sessions on macOS
- Users are a top threat to your network – and here’s why bug bounties won’t help
- How to hunt for SolarWinds Orion usage
- Bug Bounty vs. Continuous Pen Testing: Understanding the Basics