Hacked cover image

The Red Teamer

Hacked

00:00

Evolving Phishing Threats

This chapter examines the advancement of phishing attacks, focusing on sophisticated tactics like adversary in the middle (AITM) attacks that can bypass multi-factor authentication. It discusses the challenges of detecting phishing across various platforms and the impact of emerging AI technologies on cybercrime.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app