
Sign up to save your podcasts
Or


Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
By Cisco Talos4.9
1313 ratings
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.

2,010 Listeners

6,024 Listeners

370 Listeners

374 Listeners

653 Listeners

1,023 Listeners

318 Listeners

419 Listeners

8,047 Listeners

181 Listeners

313 Listeners

189 Listeners

74 Listeners

138 Listeners

44 Listeners