[RERELEASE] What are BEC attacks?

[RERELEASE] What are BEC attacks?

Update: 2025-07-15
Share

Description

In this phishy edition of the Exploring Information Security podcast, Steve Ragan of CSO joins me to discuss business email compromise (BEC) attacks.

Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR requirements next month. This ended up being one of the more difficult podcasts to get scheduled. Steve and I had to cancel on each other a few times because of phishing related stuff.

In this episode we discuss:

  • What are BEC types of attacks?

  • Who is performing BEC attacks?

  • How are people falling for them?

  • What can people do protect against this type of attack?





































[RSS Feed] [iTunes]
























































<form autocomplete="on" class="newsletter-form" method="POST">

Subscribe


Sign up with your email address to receive news and updates.









<label class="newsletter-form-field-label title" for="email-yui_3_17_2_1_1704234756218_223631-field">Email Address</label>
<input autocomplete="email" class="newsletter-form-field-element field-element" id="email-yui_3_17_2_1_1704234756218_223631-field" name="email" type="email" />







<button class="
newsletter-form-button
sqs-system-button
sqs-editable-button-layout
sqs-editable-button-style
sqs-editable-button-shape
sqs-button-element--primary
" type="submit" value="Sign Up">

Sign Up

</button>







We respect your privacy.


Thank you!

</form>
Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

[RERELEASE] What are BEC attacks?

[RERELEASE] What are BEC attacks?

With Steve Ragan