Logo
    Search

    Podcast Summary

    • How Alethe's Unfortunate Life Led Her to a Unique Career in Social EngineeringOur past experiences, no matter how unpleasant, can shape our future in unforeseeable ways. Embrace your journey and use it to your advantage.

      Alethe, a social engineer working for Critical Insight is good at reading people because of the series of unfortunate events and terrible relationships she faced in her life. Growing up in South Africa, Alethe had to grow up quickly when her parents separated when she was just seven years old. Her mom, who was like a cool big sister, let her explore her creative ideas and take risks without any guardrails. Alethe's interest in social engineering grew over time and she now helps organizations providing critical infrastructure, including DoD contractors, to secure their systems. Alethe's unique journey shows that sometimes our past experiences can lead us to unexpected and valuable places.

    • Overcoming Adversity through Computer ScienceOur experiences, both good and bad, can shape our paths in life and the skills we develop. Focus on positive interests and passions to create a fulfilling career despite setbacks.

      Growing up with limited resources and freedom, Alethe developed manipulation and sneaky behaviors as a pre-teen. However, a strict Catholic school experience taught her the negative consequences of lying and over-embellishing. Despite the setback, Alethe's interest in computers and coding provided a focus and direction for her life. She pursued studies in science and computer science, ultimately leading to a fulfilling career. The key takeaway is that early experiences, both negative and positive, can have a significant impact on an individual's life trajectory and skill development.

    • The Importance of Online Safety and Perseverance in Career JourneyBe alert while interacting with strangers online, avoid sharing personal information easily, stay informed of the digital footprint. Persevere through tough times, value small jobs for learning opportunities. Acquire OSINT skills from publicly available information.

      Alethe's experience of being groomed by a stranger she met online highlights the dangers of interacting with strangers online. Her story emphasizes the importance of being vigilant and aware while interacting with people online and not sharing personal information easily. Alethe's career journey, starting with a minimum wage job, teaches us the value of perseverance in difficult times and how small jobs can lead to a lot of learning and opportunities. Her acquisition of OSINT skills through her work at a title company highlights the power of publicly available information and reiterates the importance of staying informed and aware of the digital footprint we leave behind.

    • The High-Stakes World of Social Engineering at DefconThe Social Engineering Village at Defcon hosts a Capture the Flag contest where participants use manipulative tactics to extract sensitive information from a target company in front of a live audience, testing their knowledge and skills in high-pressure situations.

      Defcon is an annual hacking conference that features various villages where participants can try to hack different devices and systems. The Social Engineering Village is one of the most popular ones, where people learn how to manipulate others to get what they want. The main event in this village is the social engineering Capture the Flag contest, where contestants try to get information from a target company live on stage, with five hundred to a thousand hackers watching. The contestants have six weeks to investigate their target and gather information, and then they have twenty minutes to make the call and try to get specific flags of information assigned by the contest runners. It is a high-pressure situation that requires an in-depth understanding of social engineering tactics.

    • The Benefits of Social Engineering and Hacking CultureSocial engineering can enhance communication and interpersonal skills. Participating in interactive events can improve confidence and OSINT skills. Public sources are valuable but staying ethical is crucial. The hacking culture can offer a sense of belonging and acceptance. Honing social engineering skills can be beneficial to everyone.

      Social engineering is a powerful tool that can help improve communication, and interpersonal skills in different settings such as business and relationships. Participating in interactive events such as capture the flag contests can help develop confidence and sharpen OSINT skills. Public sources are valuable to learn more about a target, but one has to be creative in gathering information while staying ethical. The hacking culture can offer a feeling of belonging and acceptance that can be difficult to find elsewhere. Being a misfit is not an issue in this environment and honing social engineering skills can be beneficial to anyone.

    • The Importance of OSINT in Social EngineeringPreparing with knowledge about a company's culture, technologies, and internal processes through OSINT can increase social engineering success rates. Social media platforms can reveal valuable information to impersonate trusted entities and gain access to sensitive information.

      Being over-prepared with knowledge about the company, its culture and the technologies they use through OSINT can equip social engineers with necessary information to succeed in social engineering. Social engineers use company websites, review sites, job descriptions and Google dorking to gain insights into the company's internal processes. Social media platforms like Instagram can reveal geotagged employee pictures with company IDs, badges, applications open on the monitor, and locations of the cafeteria. Such information can be used to impersonate an internal employee, vendor, or a trusted entity and get access to sensitive information. The better equipped social engineers are with the data collected, the better his/her chances of success in social engineering.

    • Alethe's Low-Tech Approach to Winning the Social Engineering CTF CompetitionWith a well-prepared plan and thorough research on targets, a low-tech approach of using just three sheets of paper with prioritized flags, pretext details, and call goals helped Alethe secure the third position and enjoy the game more.

      Alethe had a well-prepared plan and pretext for social engineering Capture the Flag competition, which helped her to secure the third position. She had researched her targets thoroughly and had a clear idea of her goals for the call. Alethe had gone into the competition determined to do better than sixth, and focused on doing better than the previous year. She had a low-tech approach; she brought in three sheets of paper, one with a list of all the flags she had prioritized, another with her pretext person and target details, and the third with key points of her pretext and goals for the call. This helped Alethe to win and enjoy the game more than anything.

    • Balancing Hacking and Motherhood: Alethe's ExperienceWith determination, focus, and preparation, mothers can successfully multitask and balance competing and caregiving responsibilities. Alethe's hacking competition experience demonstrates that even with a three-month-old baby, it's possible to compete and succeed.

      Competing in a hacking competition with a three-month-old baby is not recommended, but Alethe, an experienced mother, managed it. She missed some calls to care for her baby and prayed she wouldn't cry while she competed. She pretexted as a new intern to access tech support and then targeted regional salespeople of a tobacco company. She used OSINT to learn about the company and confirmed information with the salespeople. She knew that the salespeople had company-issued laptops and cell phones, among other perks, which made it easy to ask confirmation questions. Alethe's experience shows that with determination, focus, and preparation, mothers can balance competing and caregiving responsibilities.

    • Building Trust for Successful Verification of Remote Workers' LaptopsBuilding trust through friendly communication and relatable conversations can lead to successful outcomes, but it is important to consider the impact on the other person and make amends if necessary.

      The approach taken for verifying software and applications on remote workers' laptops before shipping replacements out was successful due to building trust and being friendly while making calls. The person calling from IT used a tactic of introducing themselves as an internal employee from the headquarters, incentivizing with a new laptop, and creating a relatable conversation with the other person. The approach effectively removed objections and made the other person feel secure about the authenticity of the call. The friendly interaction led to the other person being forthcoming with information, leading to a successful outcome. However, the person who made the calls is concerned about the impact on the other person and feels the need to make amends and apologize after the fact.

    • Success Requires Talents, Efforts, and OpportunitiesParticipating in safe learning experiences, winning competitions, and achieving success requires hard work, perseverance, and sacrifices. Success is a combination of talent, effort, and opportunity.

      Participating in safe learning experiences can help you learn from mistakes and improve skills. Winning competitions can lead to prestigious awards like the Defcon black badge, which can open up job opportunities. However, success often requires hard work, perseverance, and sacrifices. Alethe's journey to winning the social engineering contest involved over-researching her targets, impressing the audience with her flags and time management, missing her flight, attending the closing ceremonies with her baby, and driving seven hours overnight to get back home. Despite the challenges, Alethe hoped to turn her passion into a career or business. Overall, success requires a combination of talent, effort, and opportunity.

    • Social Engineering: Identifying and Strengthening Weak Points in SecuritySocial engineering involves manipulating human psychology, and security awareness training is crucial to avoid falling prey to cybercriminals. Aspiring to enter the field can involve starting a consulting business or joining a security company with ample learning opportunities and exposure to different clients.

      Social engineering is an emerging security field that helps companies identify and strengthen their weak points. It involves manipulating human psychology, which scammers and cybercriminals also use to exploit vulnerabilities. Companies can hire social engineers for physical assessments and phishing campaigns to test employees' ability to recognize and report suspicious activity. Regular security awareness training is also essential to avoid falling into the traps of social engineers. For those who aspire to enter the field, starting a consulting business and specializing in social engineering assessments and testing is an excellent option. Joining a security company, like Critical Insight, can also provide ample learning opportunities and exposure to different clients.

    • The Importance of Being Mindful of Phishing AttacksRunning phishing campaigns can improve awareness and reduce the risks of social engineering. Companies should aim for a 10% to 20% click rate, and employees should be cautious of suspicious URLs to prevent credential theft.

      Phishing is a serious security threat and businesses should be cautious. Social engineers use tactics like setting up a landing page and making a suspicious URL to trick employees into providing their credentials. Alethe's job includes running phishing campaigns for companies and she emphasises the importance of running towards uncomfortable conversations that are organic and real to get good at this. People are becoming more aware of social engineering, and companies should aim to achieve between a 10% or 20% click rate rather than expecting 30% to 40% or 30% to 60%. Alethe's clients include organizations involved in critical infrastructure or even Department of Defense contractors. It is vital to be mindful of phishing attacks and their consequences.

    Recent Episodes from Darknet Diaries

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    137: Predator

    137: Predator
    A new type of mercenary spyware came on the radar called Predator. It’ll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Dealing With Phishing Attacks Outside of Email - DJ Sampath - ESW #184

    Dealing With Phishing Attacks Outside of Email - DJ Sampath - ESW #184

    In this segment we'll discuss why email security is still not a solved problem and how now that people are increasingly working from home, it poses an increased risk. We'll also share some interesting attacks that we've uncovered in the past several weeks since the beginning of shelter-in-place.

     

    Visit https://www.securityweekly.com/esw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/ESWEpisode184

    Security Awareness Culture Change, Part 2 - Kelley Bray, Stephanie Pratt - SCW #69

    Security Awareness Culture Change, Part 2 - Kelley Bray, Stephanie Pratt - SCW #69

    We continue the discussion about the importance of effective security awareness programs and what that would actually look like. We'll also examine how to move beyond "bare minimum" check-box mentality about meeting security awareness training requirements and imagine building a culture of security aware employees in the organization.

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw69

    Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648

    Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648

    Patrick Laverty created and co-organizes the Layer 8 Conference with Lea Snyder. This year will be the 3rd annual conference that solely focuses on social engineering and OSINT topics. Ori Zigindere is an offensive security professional with a background in software engineering. He works with a wide range of companies in all major industries to help them improve their security posture against day to day threats. Patrick and Ori join us today to talk about the Layer8 Conference, and WorkshopCon!

     

    To sign up for the Layer8 Conference, please visit: https://layer8conference.com/

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode648

    Security Awareness Culture Change, Part 2 - Kelley Bray, Stephanie Pratt - SCW #69

    Security Awareness Culture Change, Part 2 - Kelley Bray, Stephanie Pratt - SCW #69

    We continue the discussion about the importance of effective security awareness programs and what that would actually look like. We'll also examine how to move beyond "bare minimum" check-box mentality about meeting security awareness training requirements and imagine building a culture of security aware employees in the organization.

     

    Visit https://www.securityweekly.com/scw for all the latest episodes!

    Show Notes: https://securityweekly.com/scw69

    Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648

    Layer8 Conference & WorkshopCon - Ori Zigindere, Patrick Laverty - PSW #648

    Patrick Laverty created and co-organizes the Layer 8 Conference with Lea Snyder. This year will be the 3rd annual conference that solely focuses on social engineering and OSINT topics. Ori Zigindere is an offensive security professional with a background in software engineering. He works with a wide range of companies in all major industries to help them improve their security posture against day to day threats. Patrick and Ori join us today to talk about the Layer8 Conference, and WorkshopCon!

     

    To sign up for the Layer8 Conference, please visit: https://layer8conference.com/

    Visit https://www.securityweekly.com/psw for all the latest episodes!

    Show Notes: https://wiki.securityweekly.com/PSWEpisode648