March 18, 2024, 5:08 p.m. | Laura Brosnan

The Red Canary Blog: Information Security Insights redcanary.com

Learn how the Charcoal Stork activity cluster is leveraging social engineering to deliver malicious payloads via otherwise benign pathways.

cluster engineering learn malicious malicious payloads payloads social social engineering

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Open-Source Intelligence (OSINT) Policy Analyst (TS/SCI)

@ WWC Global | Reston, Virginia, United States

Security Architect (DevSecOps)

@ EUROPEAN DYNAMICS | Brussels, Brussels, Belgium

Infrastructure Security Architect

@ Ørsted | Kuala Lumpur, MY

Contract Penetration Tester

@ Evolve Security | United States - Remote

Senior Penetration Tester

@ DigitalOcean | Canada