PLAY PODCASTS
The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack

The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack

SMB Tech & Cyber Newsletter | CPF Coaching ยท Christophe Foulon ๐Ÿ““

August 20, 202524m 20s

Audio is streamed directly from the publisher (api.substack.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

The Ghost in Your Cloud: How Hackers Use Social Engineering to Infiltrate and Attack

Unmasking the "low and slow" identity attacks where threat actors lie in wait within your cloud accounts, and how to fight back before they strike.

Discover the new wave of silent cyber threats. Learn how hackers use social engineering to compromise cloud accounts, stay dormant to evade detection, and launch devastating attacks later. Protect your organization now.



This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit substack.cpf-coaching.com/subscribe