Hacked

The Red Teamer

9 snips
Feb 21, 2025
Dive into the world of red teaming with an expert who reveals how cyber threats have evolved. Discover how attackers are now logging in rather than breaking in, showcasing identity as the new frontier. Hear about the sophisticated phishing tactics that can outsmart multi-factor authentication. The conversation touches on the vulnerabilities tied to remote work and the critical need for effective identity management. Plus, enjoy anecdotes that blend humor with serious insights on cybersecurity compliance and the modern digital landscape.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ANECDOTE

Shifting Attack Strategies

  • Red teamers used to focus on network perimeters, exploiting vulnerabilities like open ports.
  • As security improved, they shifted to social engineering, sending malicious CVs with embedded macros.
INSIGHT

Attacker ROI

  • Attackers prioritize efficiency, targeting the weakest link for highest ROI.
  • Exploiting identities is now more cost-effective than developing complex malware.
INSIGHT

Identity as the New Perimeter

  • The attack surface has shifted from network perimeters to identities in the cloud.
  • Companies invest heavily in network security, but attackers target exposed identities directly.
Get the Snipd Podcast app to discover more snips from this episode
Get the app