Anatomy of a spear phishing attack

No alt text provided for this image

    You may be wondering what it takes to send this type of attack. This is not trivial, and can only be done by someone trained in advanced hacking techniques. We will first take a look at the steps required to send an attack, and then we’ll look at steps to mitigate this threat. For the (simplified) attack steps we am freely borrowing from a great blog post by Brandon McCann, a well-known pentester.

  • Spear Phishing | KnowBe4

Image result for spear phishing attack


Enter your email address:

Delivered by FeedBurner