Remove 06
Remove 2019 Remove Computer and Electronics Remove Document Remove Examples Remove Security
article thumbnail

Is Emotet gang targeting companies with external SOC?

Security Affairs

First of all the attacker knew the target organization was protected by a SOC (Security Operation Center) so she sent a well crafted email claiming to deliver a Microsoft document wrapping out the weekly SOC report as a normal activity in order to induce the victim to open-it. SOC report 10 12 2019.doc SOC report 10 12 2019.doc

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. Google Podcasts. Amazon Music.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. Google Podcasts. Amazon Music.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

Listen to EP 06: Hacking With Light And Sound on: Apple Podcasts. I’m Robert Vamosi and in this episode I’m discussing the weird science of how the physics of light and sound --not keyboards or code -- can be used to compromise electronic devices and the consequences of that in the real world. Google Podcasts. Amazon Music.