
Sign up to save your podcasts
Or
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
4.9
1313 ratings
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
1,968 Listeners
361 Listeners
627 Listeners
363 Listeners
6,019 Listeners
1,003 Listeners
311 Listeners
398 Listeners
7,876 Listeners
168 Listeners
187 Listeners
314 Listeners
77 Listeners
129 Listeners
33 Listeners