Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.
Fler avsnitt av Talos Takes
Visa alla avsnitt av Talos TakesTalos Takes med Cisco Talos finns tillgänglig på flera plattformar. Informationen på denna sida kommer från offentliga podd-flöden.
