Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
And so just keep that in your head, that it's probably a red flag. If your love interest refuses to answer the call or get on video chat with you.
And so just keep that in your head, that it's probably a red flag. If your love interest refuses to answer the call or get on video chat with you.
Yeah, dang, I didn't even think of that. So I've done video interviews with people a lot, you know, but I use a Snapchat filter on my video to obscure my face. In real time, on a live video call, my face gets distorted. And yeah, you could absolutely just use a filter to change your face to be a pretty lady, even though you're just some dude who doesn't even speak English.
Yeah, dang, I didn't even think of that. So I've done video interviews with people a lot, you know, but I use a Snapchat filter on my video to obscure my face. In real time, on a live video call, my face gets distorted. And yeah, you could absolutely just use a filter to change your face to be a pretty lady, even though you're just some dude who doesn't even speak English.
We're going to take a quick ad break here, but stay with us because when we come back, we're going to talk about Black Axe. And you're not going to want to miss this. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them.
We're going to take a quick ad break here, but stay with us because when we come back, we're going to talk about Black Axe. And you're not going to want to miss this. This episode is sponsored by Arctic Wolf. Arctic Wolf, an industry leader in managed security operations, surveyed a thousand security and IT professionals across the globe to better understand them.
What are their top priorities, current challenges and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach.
What are their top priorities, current challenges and future concerns? This survey revealed some startling findings, and you can discover them all in the State of Cybersecurity 2024 Trends Report. Learn why the number of insider threats spikes severely, what lessons can be learned from the year over year change, and how many organizations disclose a breach.
and what cyber attacks struck 70% of organizations. Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so I'm looking you up online. You're known as that BEC guy. What's BEC?
and what cyber attacks struck 70% of organizations. Download the State of Cybersecurity 2024 Trends Report today at arcticwolf.com forward slash darknet. That's arcticwolf.com forward slash darknet. Okay, so I'm looking you up online. You're known as that BEC guy. What's BEC?
BEC, we break down the term business email compromise, right? So the compromise part makes me think somebody has taken over my Office 365 email server and is in my emails. They've compromised my emails. But that's not what you say is BEC.
BEC, we break down the term business email compromise, right? So the compromise part makes me think somebody has taken over my Office 365 email server and is in my emails. They've compromised my emails. But that's not what you say is BEC.
When you tell me that story, I just think that's a phishing. I don't call phishing BEC. I just call it phishing.
When you tell me that story, I just think that's a phishing. I don't call phishing BEC. I just call it phishing.
Is BEC always money-related or is it sometimes, no, we're just going to phish them so that we can get our malware on to steal their intellectual property?
Is BEC always money-related or is it sometimes, no, we're just going to phish them so that we can get our malware on to steal their intellectual property?
So if we're going to classify something, because let's say we get phished, somebody sends us a phish, we click the link, we installed malware, you'd say, oh yeah, that wasn't BEC. But if it was, okay, we got phished, it would send money to this, and I sent the money, you'd say, oh yeah, that was BEC. Yep. Okay. So if you're going to classify as BEC, it's likely going to be financial related.
So if we're going to classify something, because let's say we get phished, somebody sends us a phish, we click the link, we installed malware, you'd say, oh yeah, that wasn't BEC. But if it was, okay, we got phished, it would send money to this, and I sent the money, you'd say, oh yeah, that was BEC. Yep. Okay. So if you're going to classify as BEC, it's likely going to be financial related.
So now this pivots the whole thing in my head, right? Instead of you and me being targeted, now they're like, well, why target somebody who has thousands of dollars when we can target a business who has hundreds of millions of dollars?
So now this pivots the whole thing in my head, right? Instead of you and me being targeted, now they're like, well, why target somebody who has thousands of dollars when we can target a business who has hundreds of millions of dollars?