Inside the Hackers’ Toolkit

Summary: In this Threatpost podcast, Jack Chapman of Egress discusses the evolving cyber threat landscape and the tactics attackers use to exploit companies, focusing heavily on the human element.

In this Threatpost podcast, Jack Chapman from Egress discusses the evolving cyber threat landscape and the tactics attackers use to exploit companies, focusing heavily on the human element. Jack explains how attackers have shifted their focus back to people after advancements in cybersecurity measures made it more difficult to exploit technical vulnerabilities.

Phishing remains a prevalent tactic, but other social engineering methods like smishing (SMS-based phishing) are also growing in prevalence. Additionally, attackers are increasingly using breach replay attacks—where stolen data from previous breaches is used to craft convincing phishing attempts. The conversation emphasizes the importance of securing multi-factor authentication (MFA) and improving employee training as key strategies for organizations to protect themselves.

Jack’s background includes co-founding anti-phishing company Aquila AI and serving as its chief technology officer before joining Egress in 2021.

Key facts

  • Attackers focus on exploiting the human element because it is less costly and easier compared to technical vulnerabilities.
  • Phishing remains a prevalent tactic, with smishing also growing in prevalence.
  • Breach replay attacks involve using stolen data from previous breaches to create convincing phishing attempts.
  • Securing multi-factor authentication (MFA) is emphasized as a key strategy for protecting against attacks.
  • Jack Chapman’s background includes co-founding Aquila AI and serving as its chief technology officer before joining Egress in 2021.

Why it matters

Understanding the tactics used by attackers, particularly their focus on human vulnerabilities, is crucial for companies to develop effective security strategies. This podcast provides valuable insights into how organizations can better protect themselves from phishing, social engineering, and breach replay attacks.

X profile@threatposthttps://twitter.com/threatpost/
Embedded content for: Inside the Hackers’ Toolkit