It’s pretty common for companies to bundle social engineering into their penetration testing programs. But when the report shows up, you may find you’re surprised and frustrated at the rate of employees clicking links to open malicious documents. How were my employees so easily manipulated? And why didn’t anyone on the IT staff catch this? Don’t sweat it. Happens to more people than you can imagine. We’ve got guidance for three forms of remediation.
05 Oct 2020
- How to defend against password spraying
- Preventing Social Engineering Breaches
- How to exploit Zerologon (CVE-2020-1472)
- How to: Execute passive internal recon during continuous penetration testing
- Credential Stuffing: 5 basics you need to understand