Brand new to even thinking about Information Security (Info Sec)? Don’t worry, we all were once. Here are some blog posts to get you started on your journey to understanding.
Justin Angel // Penetration testing and red team engagements often require operators to collect user information from various sources that can then be translated into inputs to support social engineering and password attacks. LinkedIn is obviously a prime source for this type of information since users can associate themselves with a particular company. Assuming we […]