October 20, 2022 |
Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues. Join security expert and author, Mark Sangster and threat intelligence veteran, Kevin O’Connor as they review emerging threats and attack techniques, and unpack the latest exploitations, and growing trends in the threat landscape.