Security Assessment Case Study
During a Security Assessment or Adversary Simulation, first we perform the Open-Source Intelligence gathering, commonly referred to as OSINT. Then, we determine which people in the company might be most
2025 Foundational Application of Social Engineering
During a Security Assessment or Adversary Simulation, first we perform the Open-Source Intelligence gathering, commonly referred to as OSINT. Then, we determine which people in the company might be most
At Social-Engineer, we pride ourselves on what we do and how we do it. We are a security services provider, focusing on four primary attack vectors. This case study will
Technology is providing new, more innovative ways to enhance our world. Scientists are constantly developing smarter, faster and more intelligent machines, systems and robots. There is no doubt that each
Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an organization’s employees as the first point of entry. According to the 2021 Verizon DBIR
Most companies have a security awareness program in one form or another. If they don’t, it should be on the short list of programs to start as soon as possible.
Vishing (voice-based phishing) has been a problem for quite a long time. There are many vendors in the marketplace that offer vishing services. However they tend to use robo-callers or