<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>social engineering Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/tag/social-engineering/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/tag/social-engineering</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Wed, 16 Feb 2022 20:30:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>social engineering Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/tag/social-engineering</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Jan 2022 20:26:26 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=598</guid>

					<description><![CDATA[<p>My key takeaways PC Cyborg AIDS trojan in 1998 =&#62; first known ransomware $189 asked as ransom CryptoLocker, 2013 first to ask for Bitcoin &#34;Ransomware 2.0&#34;, from 2019 made backups less of a protection the access to the victim becomes the &#34;gold&#34; Todays ransomware workflow stager look around (trickbot) and calling home (C2 server) if [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse">Webinar takeaway &#8211; Nuclear Ransomware 3.0: We Thought It Was Bad and Then It Got Even Worse</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-nuclear-ransomware-3-0-we-thought-it-was-bad-and-then-it-got-even-worse/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaway: Layer8 Conference</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 08 Oct 2021 22:59:07 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[data disposal]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[penetration test]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=564</guid>

					<description><![CDATA[<p>My key takeaways HUMINT phrases to identify background characteristics an interesting OSINT aspect in conversation is special prononciation of certain words identifying the persons origin List of words of identifiers per language The great casino heist: key takeaways from my first big social engineering engagement &#34;get out of jail&#34;-cards must be signed to work career [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference">Event takeaway: Layer8 Conference</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaway-layer8-conference/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaways: BSidesMeSh21 &#8211; day 1</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 16:34:29 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[BSides]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[containers]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[edge computing]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=507</guid>

					<description><![CDATA[<p>My key takeaways Security in sprints vs whole security sprints? Smaller activities from the very beginning. It is not full time, but always ongoing. And maybe, if the situation is very tricky, entire sprints might be necessary, too. &#8212; Thomas Fricke Kubernetes does its best to be secure inside. Unfortunatly it is not configured so [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1">Event takeaways: BSidesMeSh21 &#8211; day 1</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaways: Deepfakes – Gefahren und Herausforderungen</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaways-deepfakes-gefahren-und-herausforderungen</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaways-deepfakes-gefahren-und-herausforderungen#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 16:42:17 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[deepfake]]></category>
		<category><![CDATA[german]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=495</guid>

					<description><![CDATA[<p>My key takeaways the fragmentation of the media landscape made deepfakes relevant deepfakes still need a lot of training material no data, no deep fake voice is still an issue (delay, monotonie), but AI technology is developing fast attackers may just find someone with a similar voice then trying to generate the voice artificially the [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaways-deepfakes-gefahren-und-herausforderungen">Webinar takeaways: Deepfakes – Gefahren und Herausforderungen</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaways-deepfakes-gefahren-und-herausforderungen/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 19:35:55 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[blue team]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[solarburst]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=481</guid>

					<description><![CDATA[<p>My key takeaways First trojan probably was implemented 1983 by Ken Thompson, who invented Unix, C,.. He also warned back then: &#34;You can&#8217;t trust code that you did not totally create yourself&#34; Brand new hardware from the factory can be infected by malicious code as well Also open source software is constantly compromised example of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network">Webinar takeaway: Learn to Detect and Defend Against Supply Chain Attacks Before They Compromise Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-learn-to-detect-and-defend-against-supply-chain-attacks-before-they-compromise-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Setting the Trap &#8211; Crafty Ways the Bad Guys Trick Your Users to Own Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-setting-the-trap-crafty-ways-the-bad-guys-trick-your-users-to-own-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-setting-the-trap-crafty-ways-the-bad-guys-trick-your-users-to-own-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 26 May 2021 19:23:04 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=465</guid>

					<description><![CDATA[<p>My key takeaways Hafnium exploited the vulnerability shortly after M$ showed it in the MAP program group. Coincidence? A DC usually runs DNS, so easy to find for an attacker patch before the FBI will do it for you pretexting might be even more effective then phishing example: Teenager compromised Twitters god mode panel through [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-setting-the-trap-crafty-ways-the-bad-guys-trick-your-users-to-own-your-network">Webinar takeaway: Setting the Trap &#8211; Crafty Ways the Bad Guys Trick Your Users to Own Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-setting-the-trap-crafty-ways-the-bad-guys-trick-your-users-to-own-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Why a Security Awareness Program Isn&#8217;t Enough to Secure Your Network</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 18:25:53 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=437</guid>

					<description><![CDATA[<p>My key takeaways Humans are the de-facto top choice for cybercriminals seeking to gain access into an organization. Security Awareness &#38; frequent simulated social engineering testing is a proven method to reduce your organization’s phish prone percentage. The ideal situation for a cyber criminal or social engineer is to hijack the OODA loop by creating [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network">Webinar Takeaway: Why a Security Awareness Program Isn&#8217;t Enough to Secure Your Network</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-why-a-security-awareness-program-isnt-enough-to-secure-your-network/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>WEBINAR TAKEAWAY: When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 20:40:43 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[awareness training]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=289</guid>

					<description><![CDATA[<p>MY KEY TAKEAWAYS already 20 years ago, Kevin Mitnick testified before US Senate and highlighted social engineering and the need for training. Still today changing human behaviour is most times the weakest point. threat actors have almost unlimited time to do extensive research before an attack, so they are extremly good at buidling the trust [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust">WEBINAR TAKEAWAY: When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-when-the-bad-guys-hide-in-plain-sight-hacking-platforms-you-know-and-trust/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
