Network Compromise Via Social Media Exploitation

An Insider Look at How Social Media is Used to Compromise Enterprise Networks


  • A Case study of a Fortune 50 organization breached via social media
  • Deep dive into each layer of the new attack chain
  • A detailed look at impersonation accounts and hijacked accounts, a new staple in the attack lifecycle
  • TTPs used by the modern attacker on social media
  • Recommendations and best practices to update your security posture

Get your free copy

The attack chain has changed. In the wake of the social media revolution, cybercriminals exploit businesses and their customers on a massive scale. When every employee, brand account, customer and executive is a target, the modern cybercriminal has changed how they carry out an attack. Businesses have been slow to catch on.

©2024 by ZeroFox. All Rights Reserved.
Privacy PolicyTerms and Transparency