article thumbnail

Introducing Behavioral Information Security

The Falcon's View

Suddenly, it occurred to me, "Hey, you know what we really need is a new sub-field that combines all aspects of security behavior design, such as security awareness, anti-phishing, social engineering, and even UEBA." Well, low-and-behold, it already exists! release, expected sometime soon).

article thumbnail

The weirdest security stories of 2022

Malwarebytes

Way back in 2004, a spam email claimed that assistance was needed for a lost astronaut. Whether those compromises specifically were via some additional form of social engineering, we’ll likely never know. There’s not many individual scams which can put “18 years and counting” on their resume.

Scams 77
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Happy 10th anniversary & Kali's story.so far

Kali Linux

Quick history lesson It all began in 2004, with Whoppix , a security operating system based on Knoppix. Longer history lesson Knoppix - Initial two weeks work Whoppix (White-Hat and knOPPIX) came about as the founder, @Muts, was doing an in-person air-gap network penetration test lasting for two weeks in 2004.

InfoSec 52
article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

DXC Technology has over 40 years of infosec experience, most of which as HPE’s Enterprise Services. FireMon is a Dallas-based vendor for cybersecurity, compliance, and risk mitigation started in 2004. Deploying Cymulate with near-unlimited attack simulations can be completed within minutes via a single lightweight agent. Red Teaming.