How Hackers Are Using Google Looker Studio for Social Engineering and Credential Harvesting

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=g0UfXObsc-c



Duration: 4:04
630 views
7


Hackers are using social engineering with a Google domain, designed to elicit a user response and hand over credentials to crypto sites.

Learn how the attack occurs and how to stay protected with Check Point Harmony Cloud Email & Collaboration Security: https://blog.checkpoint.com/security/phishing-via-google-looker-studio/?utm_source=youtube-unpaid&utm_medium=social-media

#BEC #SocialEngineering #LookerStudio