How to Detect Business Email Compromise and Email Account Compromise

How to Detect Business Email Compromise and Email Account Compromise

Red Canary via YouTube Direct link

Initial access

5 of 23

5 of 23

Initial access

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

How to Detect Business Email Compromise and Email Account Compromise

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Who are we
  3. 3 What is business email compromise
  4. 4 You should care about this
  5. 5 Initial access
  6. 6 Examples
  7. 7 MFA bypass methods
  8. 8 Persistent access without MFA
  9. 9 Legacy authentication
  10. 10 Resource owner password credentials
  11. 11 B2RPC user agent
  12. 12 Authentication flows
  13. 13 adversary and middle attacks
  14. 14 open source tools
  15. 15 how to prevent email compromise
  16. 16 when account compromise can happen
  17. 17 what to look for
  18. 18 email forwarding rules
  19. 19 new inbox rule
  20. 20 Bring it on Rachel
  21. 21 Email rules
  22. 22 Poll Results
  23. 23 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.