article thumbnail

Know Your Enemy: Following a Seasoned Phisher's Train of Thought

SecureWorld News

Hallmarks of a 'mental payload' that pulls the right strings Simply put, any phishing email aims to make a recipient slip up in one of the following two ways: clicking a malicious link or downloading a malware-riddled file. This kind of foul play is known as spear-phishing. However, crooks are increasingly proficient in bypassing them.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. And is it better to be open source or commercial. No shame in that.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. And is it better to be open source or commercial. No shame in that.

article thumbnail

The Hacker Mind Podcast: Hunting The Next Heartbleed

ForAllSecure

I mean, it was open source, right? And this is open source software, meaning that there’s some developers or some project behind it that has already built out the basics of what you need to put it into your code and start using it. And is it better to be open source or commercial. No shame in that.

article thumbnail

The Hacker Mind Podcast: EP 69 Self-Healing Operating Systems

ForAllSecure

I’m Robert Vamosi and in this episode I’m exploring a novel database operating system that promises to be disruptive to how we mitigate malware today. What if we could further evolve the basic operating system beyond just managing resources but also now mitigating any malware trying to make changes. The point of this?

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

More and more criminals are identified through open source intelligence (OSINT). Find out what Daniel looks for and how he does digital forensics using social media and other open source resources. And they did, relatively quickly, using something known as Open Source Intelligence, or OSINT. You find clues.

article thumbnail

The Hacker Mind Podcast: Beyond MITRE ATT&CK

ForAllSecure

In some cases they’re taking open source, community-based tools and leveraging them in creative new ways against common threats. Living off the land or fireless malware is a threat actor leveraging the utilities readily available on a system. There are the vendors, right? They have their pitch, their angle.

Tools 40