Blog

QR Codes Abused for Qshing Attacks

As the popularity and trust of QR codes increase, so do the risks.

QR Codes Abused for Qshing Attacks - Blog

ABOUT THE AUTHOR
REBECCA TAYLOR
Threat Intelligence Knowledge Manager

<p>Rebecca joined Secureworks in 2014, where she developed an immediate passion for cybersecurity. Rebecca quickly expanded her cyber acumen, working across Business Operations and Incident Command before becoming the first Threat Intelligence Knowledge Manager in the Secureworks Counter Threat Unit™ (CTU). Rebecca focuses on the implementation of knowledge management processes and procedures for the CTU™; the ingestion and management of threat Intelligence; and its associated quality, storage, and maintenance. She is also a Human Intelligence Researcher spending time on the dark web and underground forums, with a focus on data dumps and access brokerage. Rebecca has been acknowledged in industry for her contributions, most recently winning ‘Security Woman of the Year’ at the Computing’ Security Excellence Awards 2024.</p>
Revenir aux blogs

Essayer Taegis dès aujourd’hui

Voyez par vous-même : demandez votre démo pour voir comment Taegis peut réduire les risques, optimiser les investissements de sécurité existants et pallier la pénurie de talents.