“able to reset passwords, enroll new devices, elevate user privileges and even disable multi - factor authentication ( mfa ) for users. that ’ s basically a list of most, if not all the things a threat actor needs to gain unauthorized access to network resources and move laterally…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.004Spearphishing Voice
44%
“home working and corporate pressure. this can also be exploited by seasoned vishers. - adversaries may employ tactics that even experienced service desk staff may not be able to spot, such as using ai to impersonate senior company leaders who ‘ urgently need their help ’. the ser…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.004Spearphishing Voice
39%
“able to reset passwords, enroll new devices, elevate user privileges and even disable multi - factor authentication ( mfa ) for users. that ’ s basically a list of most, if not all the things a threat actor needs to gain unauthorized access to network resources and move laterally…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1598.004Spearphishing Voice
32%
“home working and corporate pressure. this can also be exploited by seasoned vishers. - adversaries may employ tactics that even experienced service desk staff may not be able to spot, such as using ai to impersonate senior company leaders who ‘ urgently need their help ’. the ser…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Could a simple call to the helpdesk enable threat actors to bypass your security controls? Here’s how your team can close a growing security gap.