I have published 135 episodes of the Friday Phish Fry, and in the nearly three years of analyzing phishing exploits I have come to understand most of the techniques, tactics, and procedures (TTPs) used by the attackers. This article is going to explain the different approaches used in phishing.
The Email
Everything starts with the email. There are several types
SPAM – This was the first ...
Continue Reading →DEC