Hacking with Hackers: Uncovering the Human Element of Cybercrime

Hackers Rachel Tobac and James Linton share how to better protect against socially-engineered attacks. Watch the on-demand webinar from Vision 2023.

From the Nigerian Prince scams of the late 1990s to the sophisticated invoice fraud of today, one thing remains the same: attackers know how to take advantage of human emotions. Whether the goal is to steal thousands from your Grandma Sue or millions from a tech giant like Google, social engineering tactics typically play a role.

Rachel Tobac and James Linton are two well-known hackers who are both intimately familiar with how social engineering can be used for evil. Rachel is best known for her sophisticated vishing attacks at DEFCON, while James gained notoriety for a successful email attack on Eric Trump.

In this recorded session from Vision 2023, Rachel and James discuss:

  • How they became successful hackers, with stories about their most notorious attacks

  • What information hackers can uncover, both on the impersonated victim and the target, to run their attacks

  • What security leaders can do to better protect their employees and their organizations

  • How the social engineering landscape is changing as we all become a little more aware of the threat

Watch the webinar to see why social engineering is both the threat of the present and of the future.

After viewing this webinar, you are eligible for 1 CPE credit through (ISC)².

Hacking with Hackers: Uncovering the Human Element of Cybercrime

Watch Now


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Resources

B 1 23 23 Demo D Ay
Tas Jalali, Head of Cybersecurity at AC Transit speaks with Abnormal about his security strategy for the new year.
Watch Now
B 01 12 23 ADT video 1
With Abnormal, ADT has a robust security solution that protects its employees from advanced email attacks.
Read More
B 1500x1500 Hospitality L1 R1
Threat actors target hospitality businesses to steal troves of personally identifiable information. Learn how Abnormal stops these attacks.
Read More
B 1500x1500 Transportation Industry L1 R1
Cybercriminals target the transportation industry to worsen supply chain strains or put the public at risk. Learn how Abnormal prevents these attacks.
Read More
B 1500x1500 Energy Industry L2 R1
Threat actors routinely target energy and infrastructure providers to disrupt critical operational technologies. Learn how Abnormal blocks these attacks.
Read More
B 1500x1500 Intelligent security summit webinar
Discover how security leaders are mitigating new internal threats and the best ways to protect your organization from these new attack opportunities.
Watch Now
B 1 19 23 Arch Capital OPT2
See why the Arch Insurance team considers Abnormal’s platform to be a highly effective, easy-to-use risk reduction solution.
Watch Now
B 1500x1500 Green Hill Case Study 12 09 22
With Abnormal protecting inboxes & enhancing incident response, investment banking firm Greenhill can focus on guiding clients through complex events.
Read More
B 11 30 22 EAB vid
With thousands of threats stopped, Abnormal has freed up EAB’s security team to focus on improving access to education rather than investigating and remediating email threats.
Read More