Not only did I enjoy and learn from Khan's presentation, I had several follow-up conversations with him regarding cybersecurity, hacking, industry trends and much more.
I was impressed with his passion, expertise and role as a vCISO and cybersecurity practice lead, in addition to his hacking roles.
That's when I realized I was thinking like a hacker - not in the sense of malicious intent, but in the relentless pursuit of understanding how things really worked.
MK: I started my professional career with networking, learning how information travels across the Internet.
Even though I knew a lot about ethical hacking, I couldn't land a job in cybersecurity because I didn't have any relevant certifications or experience.
I offered basic cybersecurity services to nonprofits and startups for free, like assessing their security posture, making their devices more secure, setting up security tools, testing their systems for vulnerabilities and performing penetration testing.
MK: One of my earliest interests was getting into online investigations, mining the Internet for information.
Whether it was uncovering hidden data within image files or piecing together clues from social media profiles, I found satisfaction in using these skills to assist others when they had problems with hackers or stalkers.
MK: Most hacks nowadays rely heavily on social engineering tactics, where hackers don't target systems directly but instead exploit human vulnerabilities.
By leveraging publicly available information, hackers manipulate individuals into unwittingly aiding their schemes.
This is where OSINT comes into play as the initial step in a hacker's reconnaissance process.
The more information a hacker gathers about their target, the more potent their attack becomes.
Imagine if a hacker knows your specific interests or even your whereabouts based on your social media activity.
It's a sobering reminder of how crucial it is to safeguard our online presence and remain vigilant against such tactics.
MK: If you adopt a hacker's mindset, your priority should be safeguarding information they could exploit.
A key defense tactic is refraining from sharing personal details on social media platforms, such as your location, phone numbers, personal email addresses and family members' information.
Removing yourself from notorious data brokers and people-search websites can make it more challenging for malicious actors to obtain your home address or personal cellphone number.
MK: I love entertaining audiences with simple yet awe-inspiring hacks, putting them right at the heart of the action to witness the intricacies of cyber attacks firsthand.
My mission is to raise awareness about the methods hackers employ, empowering individuals to take meaningful steps toward protecting themselves.
By shedding light on how hackers hack, I aim to make security measures more impactful and relevant to everyone.
This Cyber News was published on securityboulevard.com. Publication date: Sun, 17 Mar 2024 11:43:06 +0000