The hottest Social Engineering Substack posts right now

And their main takeaways
Category
Top U.S. Politics Topics
The J. Burden Show 2556 implied HN points 06 Feb 24
  1. One reason why the ruling class resents certain groups is because social engineering didn't work on them - they continued to live the way they always have despite efforts to change them.
  2. The elites want to erase cultural differences and make everyone conform to their ideology, viewing any deviation from their beliefs as a problem that needs to be fixed.
  3. The left's animating principle is egalitarianism, believing that all people are the same - when reality doesn't align with this belief, they blame others rather than questioning their ideology.
DARK FUTURA 1434 implied HN points 07 Apr 23
  1. Key events in 2008, like the financial crash and Obama's election, led to societal shifts.
  2. Identity politics, especially around race and gender, were manipulated by elites to distract from financial industry malfeasance.
  3. The push for transhumanism is a top-down agenda to erode traditional human concepts and control society through AI.
Rod’s Blog 79 implied HN points 12 Feb 24
  1. Phishing attacks work by exploiting human psychology, using tactics like fear, urgency, and authority to manipulate targets into taking actions that compromise their security.
  2. Attackers make phishing emails appear legitimate by mimicking trusted brands and official language, leveraging social cues to deceive individuals into trusting them.
  3. To protect against phishing, individuals should cultivate skepticism, verify requests for sensitive information, and educate themselves and others about recognizing phishing attempts.
Rod’s Blog 99 implied HN points 28 Sep 23
  1. Social engineering attacks against AI involve manipulating AI systems using deception and psychological tactics to gain unauthorized access to data.
  2. Strategies to mitigate social engineering attacks include developing AI systems with security in mind, monitoring system performance, and educating users about potential risks.
  3. Monitoring aspects like AI system performance, input data, user behavior, and communication channels can help detect and respond to social engineering attacks against AI.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
Rod’s Blog 39 implied HN points 06 Feb 24
  1. Social engineering attacks can have devastating consequences on organizations, leading to financial loss, reputational harm, and legal issues.
  2. Microsoft Sentinel employs machine learning, behavioral analysis, and threat intelligence to effectively detect and mitigate social engineering attacks.
  3. To defend against social engineering, organizations should implement a comprehensive defense strategy utilizing technical controls, user awareness training, and incident response procedures.
Rounding the Earth Newsletter 7 implied HN points 02 Dec 24
  1. Totalitarianism controls how people see the world. By controlling information, it shapes culture and politics.
  2. The UniLARPy refers to a controlled narrative where various groups act under the same agenda, despite appearing to compete.
  3. Psyops, or psychological operations, manipulate perceptions and create confusion, often leading to people supporting harmful leadership unknowingly.
Rounding the Earth Newsletter 8 implied HN points 08 Nov 24
  1. Narcissism can lead to harmful behaviors, even including parents harming their children. This can often stem from a lack of empathy and an inability to admit mistakes.
  2. Societal issues often arise from manipulation by those in power, creating divisions among people. Recognizing these patterns can help individuals find new ways to work together instead of fighting each other.
  3. There are profound impacts from toxic belief systems and cultures. Understanding these influences can help people heal and move toward healthier communities.
Rounding the Earth Newsletter 8 implied HN points 02 Nov 24
  1. Theosophy is a complex belief system that influences various social and political movements. It's often overlooked in discussions about powerful organizations.
  2. Kamala Harris's background and political role may reflect a larger social engineering strategy. Some suggest that her mixed heritage is used for political gain.
  3. There are concerns about manipulation within media figures, like Candace Owens, and how they might steer public perception away from deeper issues like Theosophy.
The Corbett Report 18 implied HN points 25 Feb 24
  1. Be wary of new technologies like mixed-reality headsets, as they may have dissociative effects on users and blur the line between digital and real worlds.
  2. Pay attention to how media narratives can shape public perception of technology, even portraying initial setbacks as temporary issues before wider adoption.
  3. Consider the long-term implications of immersing oneself in digital worlds created by tech giants, and reflect on the potential loss of humanity by engaging in these fake realities.
Rounding the Earth Newsletter 6 implied HN points 06 Nov 24
  1. Social engineering plays a big role in shaping elections. Understanding how this works can help you see why certain candidates seem to be favored.
  2. People often misread polls and predictions about elections. Sometimes, the real trends are hidden or ignored until the election is past.
  3. The political landscape is influenced by larger patterns and strategies rather than just the opinions of voters. This means events can feel scripted or planned in advance.
Locks and Leaks 1 HN point 27 Feb 24
  1. Become proficient at lockpicking as a physical red teamer to develop valuable skills and connect with relevant communities.
  2. Master social engineering techniques by knowing yourself and using your personality traits to your advantage in engagements.
  3. Enhance your Open-Source Intelligence (OSINT) skills, understand PACS attacks, and learn bypass techniques to excel as a physical red teamer.
Links I Would Gchat You If We Were Friends 0 implied HN points 22 Feb 16
  1. Confessions of a serial social engineer highlight the practice of tricking people for financial gain rather than hacking machines.
  2. Being a teenager without internet access can pose challenges, especially as more educators require online work which can put students at a disadvantage.
  3. An app aims to bridge political divides and foster friendships, with claims of success in conflict zones like Israel and Palestine.
Thái | Hacker | Kỹ sư tin tặc 0 implied HN points 17 Jul 07
  1. In the world of hackers, hunting for domain names has become a new trend, with a focus on exploiting vulnerabilities in web applications.
  2. Domain name security is crucial, and choosing reputable registrars can help protect websites from being targeted by hackers.
  3. It's important to stay vigilant about cybersecurity, update antivirus tools, and be cautious of social engineering tactics used by hackers to steal domain names.
Identity Revive 0 implied HN points 24 Feb 24
  1. AI may be popular, but cybersecurity basics are crucial; focus on protecting against data loss and bot attacks.
  2. Be proactive in protecting your data by paying for AI services and implementing security measures like Attack Surface Management and bot protection.
  3. Prevent BEC and social engineering attacks by using email security tools, securing collaboration platforms, and focusing on training your staff against sophisticated scams.