
(Replay) HACKERS: How we GET IN and how to STOP US
The Cyber Threat Perspective
00:00
Phishing Techniques: Domains and legitimate hosts
They describe buying aged domains, using G Suite/Heroku or site builders to host convincing pages that bypass URL filters.
Play episode from 27:41
Transcript


