Apr 13 2019

Anatomy of a spearphishing attack

Category: PhishingDISC @ 2:12 pm

Anatomy of a spear phishing attack

You may be wondering what it takes to send this type of attack. This is not trivial, and can only be done by someone trained in advanced hacking techniques. We will first take a look at the steps required to send an attack, and then we’ll look at steps to mitigate this threat. For the (simplified) attack steps we am freely borrowing from a great blog post by Brandon McCann, a well-known pentester.

Image result for spear phishing attack

Enter your email address:

Delivered by FeedBurner

Leave a Reply

You must be logged in to post a comment. Login now.