Remove Information Remove InfoSec Remove Social Engineering
article thumbnail

State of Cybersecurity in Canada 2025: Key Insights for InfoSec Leaders

SecureWorld News

According to the report's introduction, authored by Francois Guay , Evgeniy Kharam , and Dimitry Raidman : "The State of Cybersecurity Report in Canada 2025 serves as both an informative resource and a rallying cry for Canadian leaders. Foster cross-sector information sharing to improve national cyber resilience.

InfoSec 89
article thumbnail

From Stealer to Spy: AMOS Malware Evolves into Full-Fledged Backdoor Threat for macOS

Penetration Testing

Its distribution now spans: Fake or cracked software downloads Spear phishing job scams, targeting high-value crypto holders and freelancers Once inside, victims are socially engineered to enter system passwords under the guise of enabling screen sharing or installing job-related software.

Malware 75
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Getting the Most Value Out of the OSCP: After the Exam

Security Boulevard

By the end of this phase, you should have two core outputs that will inform the next stages of analysis: Timeline : Reconstruct your exam attempt as accurately as possible by capturing timestamps of your actions; break down each event by challenge set, machine, attack stage (e.g., Needless to say, I was shocked and profoundly disappointed.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

It encompasses everything from ensuring the confidentiality and integrity of information to reducing risks, maintaining compliance, and building trust with customers. Limited Administrative Controls With restricted control over data access and retention policies, companies face challenges in managing sensitive information.

CISO 130
article thumbnail

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows

Security Boulevard

In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows.

Risk 52
article thumbnail

2024 Year in Review: What We Got Right and Looking to 2025

Security Boulevard

In the final episode of the Shared Security Podcast for 2024, join us as we recap our predictions for the year, discuss what we got right and wrong, and highlight our top episodes on YouTube. We also extend a heartfelt thank you to our Patreon supporters and special guests.

article thumbnail

ChatGPT: What are the Implications for Infosec?

SecureWorld News

The ability to ask any question on just about any topic and have a very intelligent answer given has cybersecurity experts wondering if the infosec community is using it and, if so, for what; and, if so, how is it working for writing scripts and code or imitating phishing emails, for instance. The script to do that was written by ChatGPT.

InfoSec 145