How I hacked an electric company using no phishing or social engineering tactics. This company had previous pen tests that missed this underlying vulnerability that plagues so many organizations. We’re using data breach analytics to inform our cybersecurity services to get into the mind of the hacker. The lessons learned at the end of this video are crucial for modern …
NFL Twitter Hack and Password Reset Functions
Discussing the recent Twitter account breaches of 15 NFL teams and Facebook resulting from a password reset flaw in a third party-developed application, Khoros. Learn how hackers use password reset flaws to bypass authentication and what we can all do to improve social media account security and make sure these flaws don’t bite us! It is time we start treating …
How To Approach Vendor Risk Management
In my latest video below I discuss the largest healthcare data breach of 2019 and how organizations should approach vendor risk management to manage the risk that your vendors present to you. 63% of all healthcare data breached in 2019 was due to the breach of one third-party collection agency, American Medical Collection Agency (ACMA). This breach affected Quest Diagnostics, …