AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Introduction
The hosts analyze the rise of business email compromise, highlighting a tactic involving phishing pages that proxy users through authentication systems. They also discuss notable tactics used by threat actors, including stolen credentials and exploitation.