28 subscribers
Player FM 앱으로 오프라인으로 전환하세요!
Why are "identity attacks" on the rise?
Manage episode 404071597 series 2800269
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
214 에피소드
Manage episode 404071597 series 2800269
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
214 에피소드
All episodes
×
1 How cybercriminals are camouflaging threats as fake AI tool installers 17:05

1 Inside the attack chain: A new methodology for tracking compartmentalized threats 16:29

1 Follow the motive: Rethinking defense against Initial Access Groups 16:38

1 Year in Review special pt. 4: How AI is influencing the threat landscape? 32:19


1 Year in Review special part 2: The biggest ransomware trends 18:41

1 Year in Review special part 1: vulnerabilities, email threats, and adversary tooling 18:15

1 Why attackers are using hidden text salting to evade email filters 9:59

1 How to establish a threat intelligence program (Cisco Live EMEA preview) 16:01

1 Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 13:59

1 It's the 35th anniversary of ransomware - let's talk about the major shifts and changes 23:28


1 It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights 50:38
플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.