YusufOnSecurity.com

83 - Post-Exploitation used by cyber criminals - Part 1


Listen Later

Enjoying the content? Let us know your feedback!

When cyber criminals attack an organisation, they is usually follow a beaten path. So there is method to their madness. Understanding this will allow you to follow their trail, over take and deny them reaching their objective  & causing further damage until you kick them out.

That is the topic of this week's episo, in addition, we will recap one 
trending  security news  includes:

  • PayPal Phishing Scam Uses Invoices Sent Via PayPal

- https://www.paypal.com: Common scams
- https://www.paypal.com: How to spot a fake PayPal Email
- http://www.pentest-standard.org: Post Exploitation

Be sure to subscribe!  
 
If you like the content. Follow me @iayusuf or read my blog at [https://yusufonsecurity.com](https://yusufonsecurity.com/)  
 
You will find a list of all previous episodes in there too.

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

...more
View all episodesView all episodes
Download on the App Store

YusufOnSecurity.comBy YusufOnSecurity.Com


More shows like YusufOnSecurity.com

View all
The Daily by The New York Times

The Daily

111,235 Listeners