32 min listen
#ThreatDigest: A Comprehensive Guide to Phish Kits
#ThreatDigest: A Comprehensive Guide to Phish Kits
ratings:
Length:
23 minutes
Released:
Jan 18, 2022
Format:
Podcast episode
Description
You can buy a phish kit online for 10 bucks. But beware, since it’ll probably come back to bite you in ways you might not expect.
In this episode, hosts Selena Larson and Crista Giering chat with Jared Peck, Senior Threat Researcher at Proofpoint, about the pros and cons of phish kits — and why there’s no honor among thieves.
Join us as we discuss:
What a phish kit is and how it works
Ways a phish kit relates to MFA tokens and other authorizations
Monetization, credentials for initial access, and the attack chain
How organizations and people can defend against phishing attacks
Resource mentioned:
Have Money for a Latte? Then You Too Can Buy a Phish Kit | Proofpoint US
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
In this episode, hosts Selena Larson and Crista Giering chat with Jared Peck, Senior Threat Researcher at Proofpoint, about the pros and cons of phish kits — and why there’s no honor among thieves.
Join us as we discuss:
What a phish kit is and how it works
Ways a phish kit relates to MFA tokens and other authorizations
Monetization, credentials for initial access, and the attack chain
How organizations and people can defend against phishing attacks
Resource mentioned:
Have Money for a Latte? Then You Too Can Buy a Phish Kit | Proofpoint US
For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.
Released:
Jan 18, 2022
Format:
Podcast episode
Titles in the series (100)
Exploring Vulnerability: Why Phishing Works: Just 61% of survey respondents knew what the definition of phishing was — and that was from a multiple-choice list. This response is a huge indication of the language gap between InfoSec and users, which speaks to the urgent need for security... by Protecting People