
Sign up to save your podcasts
Or


Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
By Cisco Talos4.9
1313 ratings
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.

2,005 Listeners

649 Listeners

1,035 Listeners

8,119 Listeners

191 Listeners

74 Listeners

41 Listeners

138 Listeners

40 Listeners