
Inside the Hackers’ Toolkit
08/09/22 • 16 min
1 Listener
There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.
In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.
During our conversation, we discuss:
- Weaknesses that attackers look to exploit
- Evolution of toolkits
- Securing MFA and more
There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element.
In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries.
During our conversation, we discuss:
- Weaknesses that attackers look to exploit
- Evolution of toolkits
- Securing MFA and more
Previous Episode

Being prepared for adversarial attacks
There is no question that the level of threats facing today’s businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for?
For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, Fortinet’s FortiGuard Labs to discuss the threats facing CISOs along with more.
During the course of our discussion, we dive into:
- What an attack on all fronts looks like
- The current state of the threat landscape
- New techniques being leveraged be adversaries
- The automation of threats
We also lay out what CISOs need to consider when laying out and producing their threat action plan.
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/the-threatpost-podcast-108737/inside-the-hackers-toolkit-23110761"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to inside the hackers’ toolkit on goodpods" style="width: 225px" /> </a>
Copy