December 9

WEBINAR TAKEAWAY: When the Bad Guys Hide in Plain Sight: Hacking Platforms You Know and Trust

0  comments

MY KEY TAKEAWAYS

  • already 20 years ago, Kevin Mitnick testified before US Senate and highlighted social engineering and the need for training. Still today changing human behaviour is most times the weakest point.
  • threat actors have almost unlimited time to do extensive research before an attack, so they are extremly good at buidling the trust factor
  • Kevin recommends: trust your gut! If it sounds too good to be true, it possibly is.
  • A crafty attacker tries to push the victim into system 1 thinking. To force yourself to remain in system 2, is a very effective defense mechanism against social engineering.
  • While Trump was in hospital with COVID19, it created an information vaccum = working phish bait
  • Common phishing tactic: link to trusted sources like Google Docs or O365. Document might contain hyperlink to malware.
  • Having a good and tested(!) desaster recovery plan is cruicial with more and more ransomware attacks

Demo time

  • Demo of a bad USB cable attack
  • Demo a lot of phishing mail examples and red flags
  • Demo of CVE-2020-1472 "zerologon " :fearful:

ENV


Tags

awareness training, phishing, social engineering


You may also like

Ransomware Resilience Starts in the Mind: Overcoming Cognitive Biases and Decision-Making Errors in Cybersecurity

Why We Keep Losing Despite Stronger Security Controls Over the past three years, businesses have almost doubled their confidence in cybersecurity—rising from 32% in 2021 to 54% in 2024 (The Global Cost of Ransomware Study, 2025). Despite this, ransomware’s impact has only grown: 40% of affected companies suffered significant revenue losses, 58% experienced operational downtime,

Read More

European Cybersecurity Awareness Month: Key Takeaways for a Safer Digital Future

October is synonymous with the European Cybersecurity Awareness Month (ECSM), a time when cybersecurity professionals around the world unite to promote awareness and share valuable insights. Throughout this month, I shared a series of LinkedIn posts that highlighted various facets of cybersecurity, including password managers, multifactor authentication (MFA), the dangers of phishing, and the revolutionary

Read More