
Sign up to save your podcasts
Or
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
4.9
1313 ratings
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
1,986 Listeners
364 Listeners
639 Listeners
370 Listeners
6,022 Listeners
1,018 Listeners
318 Listeners
406 Listeners
7,951 Listeners
172 Listeners
189 Listeners
316 Listeners
77 Listeners
129 Listeners
43 Listeners