The latest Developments in Social Engineering Attacks
In this session Spike Reply presents methods, tools, and techniques used by attackers when performing so-called "dynamite phishing" attacks, such as Emotet. Being subject to great media attention, this piece of malware penetrated a huge amount of organisations' security measures and caused considerable damage.
The talk quickly summarizes the threats of phishing attacks and outlines how the attack pattern changed over the years. Moreover, an outlook is given which kinds of attacks we might expect to see in the future and what we can do about it.
This session deals with one of the biggest threats to IT security and points out why phishing is so successful. Spike Reply presents the latest developments in social engineering attacks and provides insights in current attack patterns. Join our Webinar and
understand why phishing is so successful and dangerous at the same time,
learn to notice alarm signals when dealing with potentially malicious communications, such as e-mails,
understand the influence of technology development on phishing,
get to know countermeasures against current phishing attacks.
Reply's Webinars series covers all industries and spans the latest innovation trends.