

Episode 8: Hackers: How we get in and how to stop us
Sep 21, 2022
Discover the primary methods hackers use to gain access to organizations through penetration tests. Dive into the world of credential attacks and the vital role of Multi-Factor Authentication. Explore critical web application vulnerabilities like SQL injection and phishing tactics that exploit user behavior. Learn about effective tools and strategies for enhancing security and fortifying defenses against these persistent threats. This insightful discussion blends technical analysis with practical recommendations to safeguard your organization.
Chapters
Transcript
Episode notes
1 2 3 4 5 6
Intro
00:00 • 2min
Navigating Credential Attacks
02:28 • 15min
Web Application Vulnerabilities Uncovered
17:14 • 8min
Exploring Free Tools and Phishing Tactics in Cybersecurity
24:49 • 4min
Phishing Tactics and Effective Email Security Assessments
28:50 • 2min
Enhancing Security Measures Against Phishing Attacks
31:04 • 3min