Главная
Study mode:
on
1
Introduction
2
Agenda
3
Digital Transformation
4
New Targets
5
Attack Tactics
6
Fishing
7
SSL Certificates
8
Session Randomization Folders
9
New Delivery Methods
10
AntiResearch Techniques
11
Session Protection Techniques
12
Blocked AP List
13
Reverse Proxy Phishing
14
Instagram Phishing
15
What is Mobile Emulator
16
Device Fingerprint Spoofing
17
Example
18
Network Connection
19
Scripts
20
Second Factor Authentication
21
Transfer of Funds
22
Artificial Intelligence
23
Phishing
24
What you need to do
25
Thank you
Description:
Explore advanced fraud techniques and countermeasures in this 40-minute RSA Conference talk. Delve into how adversaries exploit digital transformation to automate credential theft and account takeovers on an unprecedented scale. Learn about sophisticated attack tactics, including fishing, SSL certificate manipulation, and session randomization. Discover new delivery methods and anti-research techniques employed by cybercriminals. Examine real-world examples of Instagram phishing, mobile emulator exploitation, and device fingerprint spoofing. Understand the role of artificial intelligence in modern phishing attacks. Gain valuable insights on protecting against these evolving threats and implementing effective security measures to safeguard digital assets and user accounts.

Uncovering Large Scale Fraud Operations

RSA Conference
Add to list
0:00 / 0:00