Defense in Depth cover image

When Social Engineering Bypasses Our Cyber Tools

Defense in Depth

CHAPTER

How Does an Attacker Get Into Slack?

"It's time to really grow up and realize that we have all these other avenues to communicate about business," he says. "We're really only spending all our time thinking about emal as as the way to attack." Slack, like teams, is considered a trusted environment but can be compromised by impersonating someone else. The more secure chat platforms are becoming overtime, more open and connected.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner