You may access the recording on-demand and pass your exam by January 6th 5pm PST to get certified!
Course 1 Title: Anatomy of the Phish – Breaking Down the Latest Phishing Attacks
Course 1 Description:
The migration to working from home has forced many security teams to drastically change their defensive strategies to protect end users. In response, threat actors have become more devious, more targeted, and more highly motivated to compromise your sensitive data.
Attackers are working harder than ever, using new methods and new bait to lure and hook their victims. You’ll learn from the most recent real-world examples of phishing attacks seen by Proofpoint, which utilize Microsoft office collaboration tools and OAuth permissions, TOAD (telephone-oriented attack delivery) methods, text messages, PhaaS supply chains and others. By understanding the way phishers operate, you’ll be better prepared to recognize and combat attacks when they occur in your organization.
In this first session, we discuss:
- How phishing has evolved in the last several years
- Modern phishing techniques including BEC/EAC, advanced social engineering, and more
- Recent examples of phishing attacks seen in the wild
- Phishing trends to watch out for in the future