“We’ve seen a marked increase in social engineering attacks”


Attackers know that there are going to be configuration weaknesses which leaves your users open to social engineering attacks.  The tools may be the same, but the techniques have developed.

Richard also gives advice to Infosec Leaders on where exactly to start with your threat hunting.  With cyber criminals needing credentials, it’s no surprise where he says you should start hunting…

Presenter: Russell Lawson
Music: Late Night (Loop), Joseph McDade

 



Source link