
141: The Pig Butcher
Darknet Diaries
Understanding Business Email Compromise
This chapter explores the tactics and financial motivations behind business email compromise (BEC), differentiating it from traditional phishing. It highlights the evolution of scams, particularly the transition from Nigerian 419 scams to sophisticated BEC schemes, and discusses the techniques scammers use to exploit companies. Additionally, the importance of advanced email security measures and threat intelligence systems in combating these cyber threats is emphasized.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.