This week's Ericsson Enterprise Wireless Solutions' Threat Intelligence Hot Shots, Alex Ryan discusses the idea of data consolidation and mining of breached data, which can be used by threat actors for social engineering and pretexting. The data can be used for credential theft, extortion, and malicious insider attacks. AI can be used to strip out usernames and passwords, and to create authentic emails to target individuals. Users are becoming more susceptible to social engineering, and it is important to remove automatic logins from profiles.
This week we looked at:
www.itsecurity...
www.verizon.co...
www.malwarebyt...
Негізгі бет Threat Intelligence Hot Shots: Episode 9 - Breaches Fueling Social Engineering
Пікірлер