From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Encore: port mirroring (noun) [Word Notes]
It's the intricate deceptions that get you.
Encore: Network Detection and Response (NDR) (noun) [Word Notes]
Password Perils: The threat of credential stuffing exploits.
Encore: shadow IT (noun) [Word Notes]
The DNA dilemma: Unraveling a 23AndMe breach.
Stolen personality?
The grinch who hacked Christmas. [Hacking humans goes to the movies]
Reeling in some phishing trends.
chaos engineering (noun) [Word Notes]
Shielding your inbox.
Encore: remote access Trojan or RAT (noun)
Small, medium, and large phishing trends of 2023.
zero knowledge proof (noun)
Encore: The age old battle between social engineering and banking.
Encore: business email compromise or BEC (noun) [Word Notes]
Cops in the catfish game.
HIPAA (noun) [Word Notes]
Unmasking the deceptive.
Encore: man trap (noun) [Word Notes]
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast