"preventing the completion of actions that might seem completely legitimate in the face of an uncanny deepfake. in another instance, an advanced persistent threat ( apt ) group recently used weaponized pdfs to abuse windows protocols and execute malware on victims ’ machines. this…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566Phishing
67%
"phishing in the fast lane | huntress phishing continues to be a hot - button issue and a prevalent worry for many, so let ' s keep this conversation alive. in a recent installment of tradecraft tuesday, our very own chris henderson, huntress sr. director of threat operations, sat…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.003Spearphishing via Service
63%
". notice the urgent language and uneven spacing among the text and the " verify account " button. casting a wide net with chatgpt with a basic prompt including names, job titles, companies, and vendors used by huntress, our own truman kain was able to create an excellent approxim…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
59%
"convincing tools. the redux version : nothing is sacred even landing pages aren ’ t safe. with tools like singlefile, attackers can now convert these pages into cloned versions that act as the perfect accessory to add to the “ ai - powered ” tacklebox of tools. stripping away unn…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598Phishing for Information
57%
"phishing in the fast lane | huntress phishing continues to be a hot - button issue and a prevalent worry for many, so let ' s keep this conversation alive. in a recent installment of tradecraft tuesday, our very own chris henderson, huntress sr. director of threat operations, sat…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
"transcripts for our copious note - taker crowd! ) here. now, to recap this episode and provide you with the “ highlight reel ” around all things phishing. phishing in current events gets even fishier together, henderson and kain cover recent, costly phishing incidents like a $ 25…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
46%
"phishing in the fast lane | huntress phishing continues to be a hot - button issue and a prevalent worry for many, so let ' s keep this conversation alive. in a recent installment of tradecraft tuesday, our very own chris henderson, huntress sr. director of threat operations, sat…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1684.001Impersonation
35%
"transcripts for our copious note - taker crowd! ) here. now, to recap this episode and provide you with the “ highlight reel ” around all things phishing. phishing in current events gets even fishier together, henderson and kain cover recent, costly phishing incidents like a $ 25…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Join Huntress team members as they walk through some of the most malicious phishing techniques, presented from the attacker's perspective.