Staying one step ahead of cybercriminals is a relentless task for cybersecurity professionals, and it’s exacerbated by the availability of easy-to-use, and often free, tools. Understanding what’s in a hacker’s toolkit is essential for cybersecurity practitioners and vendors when creating their defenses.
Our threat researchers have analyzed thousands of phishing emails to identify the tactics and tools being used. This report contains their findings, covering how to defend against those used in the first three stages of the cyber kill chain: reconnaissance, weaponization, and delivery.