
Sign up to save your podcasts
Or
"Send me a quick text"
Summary:
This episode breaks down the ShinyHunters social engineering campaign that breached Google, Adidas, Louis Vuitton, and more—without malware or exploits. The attackers used voice-based social engineering to trick employees into authorizing a malicious Salesforce app via an 8-digit code, then leveraged cloud integrations to pivot into Microsoft 365 for deeper access.
Defensive Actions:
Files, Folders, Tools & Configurations:
Support the show
Thanks for spending a few minutes on the CyberBrief Project.
If you want to dive deeper or catch up on past episodes, head over to cyberbriefproject.buzzsprout.com.
You can also find the podcast on YouTube at youtube.com/@CyberBriefProject — I’d love to see you there.
And if you find these episodes valuable and want to support the project, you can do that here: buzzsprout.com/support
Your support means a lot.
See you in the next one, and thank you for listening.
"Send me a quick text"
Summary:
This episode breaks down the ShinyHunters social engineering campaign that breached Google, Adidas, Louis Vuitton, and more—without malware or exploits. The attackers used voice-based social engineering to trick employees into authorizing a malicious Salesforce app via an 8-digit code, then leveraged cloud integrations to pivot into Microsoft 365 for deeper access.
Defensive Actions:
Files, Folders, Tools & Configurations:
Support the show
Thanks for spending a few minutes on the CyberBrief Project.
If you want to dive deeper or catch up on past episodes, head over to cyberbriefproject.buzzsprout.com.
You can also find the podcast on YouTube at youtube.com/@CyberBriefProject — I’d love to see you there.
And if you find these episodes valuable and want to support the project, you can do that here: buzzsprout.com/support
Your support means a lot.
See you in the next one, and thank you for listening.