🛡️ Bitdefender presents CYBERCRIME: From the Frontline, Season 2—this is the podcast that takes you inside real-life cyberattacks. In this episode, we’re exploring unexpected frontlines, including environments you didn’t expect to protect. Some of these technological layers are hidden, others are forgotten about, and a few are just emerging. As defenders, we might view these layers individually, but cybercriminals view them as a large, inviting attack surface. 🔊 Here are some of...
All content for CYBERCRIME: From the Frontline is the property of Bitdefender and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
🛡️ Bitdefender presents CYBERCRIME: From the Frontline, Season 2—this is the podcast that takes you inside real-life cyberattacks. In this episode, we’re exploring unexpected frontlines, including environments you didn’t expect to protect. Some of these technological layers are hidden, others are forgotten about, and a few are just emerging. As defenders, we might view these layers individually, but cybercriminals view them as a large, inviting attack surface. 🔊 Here are some of...
Business Email Compromise: Billions in Losses, One Click at a Time
CYBERCRIME: From the Frontline
55 minutes
7 months ago
Business Email Compromise: Billions in Losses, One Click at a Time
🛡️ Bitdefender presents Cybercrime: From the Frontline—the podcast that takes you inside real cyberattacks. 🔊 In this episode: ↪︎ Organizations around the world have now lost more than $55 billion through business email compromise (BEC) attacks. ↪︎ Learn how attackers perpetrating this fraud leverage proprietary information, abuse trusted relationships, and act with a sense of authority. ↪︎ Understand a recent twist where business email compromise attacks may not in...
CYBERCRIME: From the Frontline
🛡️ Bitdefender presents CYBERCRIME: From the Frontline, Season 2—this is the podcast that takes you inside real-life cyberattacks. In this episode, we’re exploring unexpected frontlines, including environments you didn’t expect to protect. Some of these technological layers are hidden, others are forgotten about, and a few are just emerging. As defenders, we might view these layers individually, but cybercriminals view them as a large, inviting attack surface. 🔊 Here are some of...