Reading time:
~4 min
Posted
by stuart
on
11 January 2016
Collecting and performing Open Source Intelligence (OSINT) campaigns from a wide array of public sources means ensuring your sources contain...
Reading time:
~3 min
Posted
by Dominic White
on
16 January 2013
On a recent engagement, we were tasked with trying to gain access to the network via a phishing attack (specifically...
Reading time:
~2 min
Posted
by vlad
on
26 November 2012
When performing spear phishing attacks, the more information you have at your disposal, the better. One tactic we thought useful...