Enterprise Network Compromise Via Social Media Exploitation
By ZeroFox
Added
This report offers the following highlights - Case study of a Fortune 50 organization breached via social media, Deep dive into each layer of the new attack chain, A detailed look at impersonation accounts and hijacked accounts, a new staple in the attack lifecycle, Tactics, techniques, and procedures (TTPs) used by the modern attacker on social media, Recommendations and best practices for updating your security posture.
Tags
Social media Threat actor Credentials Phishing Security incident Integrity Malware Reconnaissance Senior management Social engineeringTopic Map
