
Episode 170: The Evasive Adversary
The Cyber Threat Perspective
00:00
Voice phishing as an effective entry
Tyler explains why voice phishing succeeds and how attackers leverage it into RMM installations.
Play episode from 01:56
Transcript

Tyler explains why voice phishing succeeds and how attackers leverage it into RMM installations.