#25, Proxy Phishing & Session Hijacking

12098118678?profile=RESIZE_400x12098410099?profile=RESIZE_180x180Or man-in-the-middle (MITM) attacks, cybercriminals use spoofing, hijacking, or eavesdropping techniques to put themselves between a user and services such as a web application to steal financial information or login credentials. Once a criminal has this information, they can manipulate account credentials, steal funds, or make unauthorized purchases. Because of its scope, MITM attackers often target banking, online retailers, and software-as-a-service (SaaS) platform customers. Bill Schenkelberg, our Managing Director, will speak with David Hyde-Volpe, a cyber security expert with VIZUS. 

 

WEEKLY WEBINAR REDSHORT REGISTRATION

Register for our LIVE REDSHORT. webinars and never miss our weekly broadcast. RED' as in something important from Red Sky Alliance and 'SHORT' as in 10 minutes or less. We will cover highlights of trending topics.

REGISTER HERE

Comments

You need to be a member of Red Sky Alliance to add comments!

Comments are closed.

Topics by Tags

Monthly Archives