article thumbnail

Kevin Mitnick, Hacker Turned Cybersecurity Leader, Dies at 59

eSecurity Planet

Once dubbed “the world’s most wanted hacker” after his youthful exploits attacking Digital Equipment Corporation and Pacific Bell, Mitnick completed his decade-long transition to cybersecurity luminary when he joined KnowBe4 as Chief Hacking Officer and part owner in 2011.

article thumbnail

BH EU 2022 and BSides London

Javvad Malik

My presentation on navigating the social engineering jungle. Andy and I had met at the first BSides back in 2011, and we decided to recreate the photo we took back then. And then, it was my turn to take the stage (a considerably smaller stage compared to Dan, in the basement, at the back).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Reken raises $10M from Greycroft to protect against generative AI-enabled fraud

The Last Watchdog

The funding will be used for core research and development to build new AI technology and products to protect against generative AI threats, such as deepfake social engineering and autonomous fraud. He is a graduate of MIT and in 2011 was named by The Boston Globe to their MIT150 list of the top MIT innovators of the past 150 years.

article thumbnail

The Scammers’ Playbook: How Cybercriminals Get Ahold of Your Data

eSecurity Planet

As a matter of fact, the most-reported crime in the 2021 Internet Crime Report report was phishing , a social engineering scam wherein the victim receives a deceptive message from someone in an attempt to get the victim to reveal personal information or account credentials or to trick them into downloading malware. Social Tactics.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

For several years beginning around 2010, a lone teenager in Vietnam named Hieu Minh Ngo ran one of the Internet’s most profitable and popular services for selling “ fullz ,” stolen identity records that included a consumer’s name, date of birth, Social Security number and email and physical address.

article thumbnail

Microsoft: Slow MFA adoption presents “dangerous mismatch” in security

Malwarebytes

Other cybercrimes that specifically target accounts are spear phishing, social engineering attacks, and password sprays —basic password attack tactics that nation-states carry out against target companies and governments. Google introduced 2FA to Gmail in 2011. There’s low MFA adoption elsewhere, too.

article thumbnail

Copycat Criminals mimicking Lockbit gang in northern Europe

Security Affairs

The LockBit Locker group is known for using a combination of advanced techniques, even phishing, and also social engineering, to gain initial access to a company’s network. He is a former member of the ANeSeC CTF team, one of the firsts Italian cyber wargame teams born back in 2011.