
Sign up to save your podcasts
Or


Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
By Cisco Talos4.9
1313 ratings
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.

2,003 Listeners

6,024 Listeners

369 Listeners

373 Listeners

638 Listeners

1,016 Listeners

322 Listeners

414 Listeners

8,002 Listeners

175 Listeners

314 Listeners

188 Listeners

73 Listeners

134 Listeners

44 Listeners