Hacking Humans cover image

A boom of infostealers and stolen credentials.

Hacking Humans

00:00

What's the Lifecycle of an Info-Stealer?

Credentials are increasingly being used as the point of entry into corporate networks. Threat actors can go in and buy info-stealers that steal everything off of a computer. From there on those marketplaces where that data is sold, really it's anyone's guess who's going to actually end up purchasing that lot.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app