
The Red Teamer
Hacked
Evolving Phishing Threats
This chapter examines the advancement of phishing attacks, focusing on sophisticated tactics like adversary in the middle (AITM) attacks that can bypass multi-factor authentication. It discusses the challenges of detecting phishing across various platforms and the impact of emerging AI technologies on cybercrime.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.