Friday, 16 October 2020

Leveraging breached data to unmask cybercriminals

How are threat actors so successful? They gather breached data and information from open sources – think social media profiles or even voting records – to build digital profiles of individuals with just a few clicks. This can then lead to, among other attacks, phishing scams such as business email compromise, potentially inflicting a significant financial toll on an organization.

from Cyber Security News https://ift.tt/3j5glQm

No comments:

Post a Comment