Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AvntN08axtAHobspN2 by [email protected]
More posts by [email protected]
Post #AvlShobPxf332h94ZE by [email protected]
0 likes, 1 repeats
Heard from a friend their company did a phishing simulation… using their actu…
Post #AvlSqTEcm6tLNVbx5s by [email protected]
0 likes, 1 repeats
@SwiftOnSecurity And then they'll ask why their employee have trusts issues…
Post #AvlSuF8h7lBeosdWL2 by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity to be fair, if users avoided even legitimate mail, things migh…
Post #AvlT4VQ3RyyQCteMhE by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity worked at a company that did the same, and used a meeting with…
Post #AvlUuRNpngVEhcwKxs by [email protected]
0 likes, 1 repeats
@SwiftOnSecurity Well, it's a useful skill...
Post #AvlV6XD7xbZiFbhNOy by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity i don't even need training to do that!
Post #AvlVOUsPNSvADwZYlk by [email protected]
0 likes, 1 repeats
@SwiftOnSecurity "This email could have been ignored"
Post #AvlVtw6eBjN9eVDx3I by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity Damned straight. An attacker may forge the headers well enough…
Post #AvlXi9qxS390ilOfbs by [email protected]
0 likes, 0 repeats
@tknarr @SwiftOnSecurity it's a nasty test but I too see the logic in it.Th…
Post #AvlXrPRcqtwRgPxXoe by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity what is this "legitimate email" of which you speak?
Post #AvlY7rLAu4qcpmmnNA by [email protected]
0 likes, 1 repeats
@SwiftOnSecurity That balances with the number of times companies send out legi…
Post #AvlZHogLk5QxRI0CDg by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity had essentially the same. Also, I told our antispam that the m…
Post #AvlcA59CwLQG3GVIbQ by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity I delete all emails unopened as a general rule. If it’s impo…
Post #AvlfEtrYci4qMaEl96 by [email protected]
0 likes, 0 repeats
@tknarr @SwiftOnSecurity if your org can't at least flag spoofed messages, …
Post #AvlfRSjKoTMryfNgyu by [email protected]
0 likes, 0 repeats
No need - I avoid all mail per default; phishing or legitimate
Post #AvlfaNQJudk07pjocS by [email protected]
0 likes, 0 repeats
@tknarr @SwiftOnSecurity > An attacker may forge the headers well enough to …
Post #AvlfaY5SGYaRCJ3o7k by [email protected]
0 likes, 0 repeats
@krupo @tknarr @SwiftOnSecurity IMO you should only do this if you think your o…
Post #AvlfaYBpspgtW62u4O by [email protected]
0 likes, 0 repeats
@kevinmirsky @tknarr @SwiftOnSecurity agreed on that. Dunking isn't the goa…
Post #AvlfeUJOFCiKeBSNii by [email protected]
0 likes, 0 repeats
@krupo @SwiftOnSecurity Just make it realistic. Link to a document on an extern…
Post #AvlgqRlbdEbwBQv9l2 by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity That's not a bad idea, really.
Post #AvmZ9gFRPUli7gUpWa by [email protected]
0 likes, 0 repeats
@SwiftOnSecurityYou're speaking of the domain name of the link, right?On my…
Post #AvntN08axtAHobspN2 by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity I'm fucking astonished at the replies that see this as a l…
Post #Avxw44CXsI8aMMzdmC by [email protected]
0 likes, 0 repeats
@tknarr @SwiftOnSecurity They don't teach people reading mail headers anymo…
Post #Avxw5k9HOvJukMGV7o by [email protected]
0 likes, 0 repeats
@SwiftOnSecurity fooling your users is the goal, right?
Post #Avxw6BBgs4I8bebJ8C by [email protected]
0 likes, 0 repeats
@SwiftOnSecurityThey then received an email from their local IT support team ur…
Post #Avxw6N0QvkPvGDQUFc by [email protected]
0 likes, 0 repeats
@kevinmirsky @krupo @tknarr @SwiftOnSecurity and you should be training people …
Post #Avxw7Bmi8WkAkQOkRU by [email protected]
0 likes, 0 repeats
@sigi714 @SwiftOnSecurity Parsing the headers for validity is deep magic even f…
Post #Avxw7KPe3ednVUfxEu by [email protected]
0 likes, 0 repeats
@kevinmirsky @krupo @SwiftOnSecurity I've seen the insider attack too often…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.