Loved this post, congratulations! However I think there is maybe a small paragraph missing about in person social engineering. Many companies have been compromised in the past by having a hacker simply pose as a janitor and access a terminal in the company or simply see the logins written on post-it notes on the screen.
Good point! Thanks for the comment. May update the article later to write a bit on that.
Looking forward to it! Keep up the good work I need to find the time to write more articles on security as well.
We're a place where coders share, stay up-to-date and grow their careers.
We strive for transparency and don't collect excess data.