Completed
Putting it all together
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Disrupting BEC Attacks Utilizing Kill Chain
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 How many of you like me
- 3 BEC attack example
- 4 BEC attack definition
- 5 How in the world is it
- 6 How banks can help
- 7 What can we do
- 8 What actually happens
- 9 What happens to your data
- 10 An anonymized list
- 11 Verifying email addresses
- 12 Generating targets
- 13 Vendor email compromise
- 14 The gray zone
- 15 What we were able to do
- 16 Over some period of time
- 17 Putting it all together
- 18 Why this is such a big problem
- 19 Deep Dives
- 20 Questions
- 21 OASIS
- 22 Vendor Compromise
- 23 Identifying Fraudulent Transactions
- 24 Authentication of Customers
- 25 Romance Scam
- 26 Reporting Fresh Accounts
- 27 Vendor Email Accounts
- 28 How Many Mules
- 29 Mule Accounts
- 30 API
- 31 API Automation
- 32 Gift Card Vector
- 33 Payroll Diversion
- 34 Thank you