DISCARDED: Tales From the Threat Research Trenches cover image

Champagne Attack Chains on a Kool-Aid Budget

DISCARDED: Tales From the Threat Research Trenches

00:00

Outdated Tactics and the Use of Legitimate Services in Cyber Attacks

This chapter explores the ongoing reliance of cyber actors on outdated attack chains and legitimate services like Google Drive and Dropbox to deliver malware. It examines the effectiveness of these techniques and how the familiarity of these platforms may eventually lead to increased recognition of their malicious use.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app