#ThreatDigest: A Comprehensive Guide to Phish Kits

You can buy a phish kit online for 10 bucks. But beware, since it’ll probably come back to bite you in ways you might not expect.In this episode, hosts Selena Larson and Crista Giering chat with Jared Peck, Senior Threat Researcher at Proofpoint, about the pros and cons of phish kits — and why there’s no honor among thieves.Join us as we discuss:What a phish kit is and how it worksWays a phish kit relates to MFA tokens and other authorizationsMonetization, credentials for initial access, and the attack chainHow organizations and people can defend against phishing attacksResource mentioned:Have Money for a Latte? Then You Too Can Buy a Phish Kit | Proofpoint USFor more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.

Om Podcasten

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.