
đź”´ August 11's Top Cyber News NOW! - Ep 428
Daily Cyber Threat Brief
00:00
How to Fish Emails and Attack Executives
The threat actor uses an adversary in the middle technique, which is a 2023 version of man in the middle. They go to a phishing page that basically looks like an office 365 page. When you log into it, it allows it allowing the person to steal your authentication token. Now they're in your email and can do things like set up a forward to address. It's not uncommon for major vendors to release major reports In line with black hat.
Play episode from 46:00
Transcript


