DISCARDED: Tales From the Threat Research Trenches cover image

Weird & Wacky Researcher Summer: The Artifacts & Detections Edition

DISCARDED: Tales From the Threat Research Trenches

00:00

How to Spot Suspicious Activity in Social Engineering Campaigns

A lot of the actors using kind of the same pictures of driver's license or passports or like personalized social engineering. One of the activity clusters that we track uses kind of some similar lures like that in sort of widespread social engineering campaigns. They always have this like super juvenile like code in their malware and I just hate looking at it because it makes me so uncomfortable to read them.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app