Resource Guide for Digital Risk Protection During COVID-19 Learn more


Network Compromise Via Social Media Exploitation

impersonated executives

An Insider Look at How Social Media is Used to Compromise Enterprise Networks

The attack chain has changed. In the wake of the social media revolution, cybercriminals exploit businesses and their customers on a massive scale. When every employee, brand account, customer and executive is a target, the modern cybercriminal has changed how they carry out an attack. Businesses have been slow to catch on.


  • A Case study of a Fortune 50 organization breached via social media
  • Deep dive into each layer of the new attack chain
  • A detailed look at impersonation accounts and hijacked accounts, a new staple in the attack lifecycle
  • TTPs used by the modern attacker on social media
  • Recommendations and best practices to update your security posture

See the Platform in Action

Fill out the form and one of our experts will get in touch with you.

Stay Informed

Best practices, the latest research, and breaking news, delivered right to your inbox.