Threat Insight<p>State-sponsored threat actors often leverage techniques first developed and deployed by cybercriminal actors. One example is <a href="https://infosec.exchange/tags/ClickFix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ClickFix</span></a>, a highly effective technique that involves clever <a href="https://infosec.exchange/tags/socialengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>socialengineering</span></a>.</p><p>Listen as Proofpoint threat research experts Selena Larson, Sarah Sabotka, and Saher Naumaan deep dive into how modern <a href="https://infosec.exchange/tags/espionage" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>espionage</span></a> and <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> are increasingly blurring lines.</p><p>Stream DISCARDED now:<br>Apple Podcasts: <a href="https://brnw.ch/21wSNbM" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbM</span><span class="invisible"></span></a><br>Spotify: <a href="https://brnw.ch/21wSNbL" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbL</span><span class="invisible"></span></a><br>Web player: <a href="https://brnw.ch/21wSNbN" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">brnw.ch/21wSNbN</span><span class="invisible"></span></a></p>