Several phishing techniques are used to infect networks or obtain personal information. But some attacks are almost always proven successful. Why? In this live podcast, we dive deep into deconstructing sophisticated phishing attacks. We will use real-life case studies to reverse engineer attacks from demoing phishing servers to establishing remote access communication and obtaining credentials from deceived victims. We will also show how hackers can evade technical and human detection even when the company has a mature cyber security posture. Lastly, we will look at practical ways you can protect your company.