
Sign up to save your podcasts
Or
QR Codes are used everywhere in our society, from reading restaurant menus to accessing Wi-Fi networks and authenticating payments. However, as with any technological advancement, there's a flip side. While QR codes are not malicious in their essence, the landscape has shifted in recent years.
Threat actors have evolved their tactics to exploit QR codes in various ways, posing new cybersecurity challenges. In this episode, host Andy teams up with Microsoft Certified Trainer Paul Schnackenburg to discuss the darker side of QR codes and the different ways in which threat actors are deceiving individuals.
Episode Resources:
The Danger of Malicious OAuth Apps in M365
Train your users to spot malicious emails with the Security Awareness Services Demo
Safeguard your users from malicious QR codes with Advanced Threat Protection
5
55 ratings
QR Codes are used everywhere in our society, from reading restaurant menus to accessing Wi-Fi networks and authenticating payments. However, as with any technological advancement, there's a flip side. While QR codes are not malicious in their essence, the landscape has shifted in recent years.
Threat actors have evolved their tactics to exploit QR codes in various ways, posing new cybersecurity challenges. In this episode, host Andy teams up with Microsoft Certified Trainer Paul Schnackenburg to discuss the darker side of QR codes and the different ways in which threat actors are deceiving individuals.
Episode Resources:
The Danger of Malicious OAuth Apps in M365
Train your users to spot malicious emails with the Security Awareness Services Demo
Safeguard your users from malicious QR codes with Advanced Threat Protection