From the intrusion kill chain model, the first part of an exploitation technique where the hacker tricks their victims into revealing their login credentials. In the second part of the technique, hackers legitimately log into the targeted system and gain access to the underlying network with the same permissions as the victim. Hackers use this method 80% of the time compared to other ways to gain access to a system like developing zero day exploits for known software packages. The most common way hackers steal credentials is with some version of a phishing attack.
Encore: Diamond Model (noun) [Word Notes]
Beware ChatGPT curious: Fleece-ware chabot apps.
CISA (noun) [Word Notes]
CISA (noun) [Word Notes]
spam (noun) [Word Notes]
Risky chat applications.
Replier attacks: the latest tool in a hacker's arsenal.
dumpster diving (noun) [Word Notes]
Criminals...assemble! [Hacking humans goes to the movies]
The rise of ChatGPT: A look into the future of chatbots.
SEO poisoning (noun) [Word Notes]
Are you who you say you are?
passkey (noun) [Word Notes]
catfish (noun) [Word Notes]
Bringing in the human side of scamming.
QR code phishing (noun) [Word Notes]
Who says the perfect heist doesn't exist? [Hacking Humans Goes to the Movies]
Data privacy in a consumers world.
attribution (noun) [Word Notes]
Remedies for infectious computers.
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast