Introducing Idira, the next-generation identity security platform.
  • Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
  • magnifying glass search icon to open search field
  • Contact Us
  • What's New
  • Get Support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Login to download
    • Join us to become a member
  • EN
    Language
  • Contact Us
  • What's New
  • Get support
  • Under Attack?
  • Demos and Trials
Podcast

From Bytes to Bait: Navigating Phishing, Smishing, and Vishing with Sama Manchanda

Nov 16, 2023
podcast default icon
podcast default icon

Threat Vector | From Bytes to Bait: Navigating Phishing, Smishing, and Vishing with Sama Manchanda

00:00 00:00

Join host David Moulton and cybersecurity expert Sama Manchanda in this enlightening episode of Threat Vector. Sama, a consultant with Unit 42, shares her unexpected journey into the world of cybersecurity, reflecting on how an elective course transformed her career trajectory. The conversation delves into the dynamic and fast-evolving nature of cybersecurity, underscoring the constant emergence of new threats and trends. Sama provides an in-depth analysis of various social engineering tactics like phishing, vishing, and smishing, illuminating how attackers craft these deceptions to target individuals and organizations. She underscores the importance of detailed reconnaissance and tailored strategies in executing these attacks, offering insights into the meticulous planning that goes into such exploits. Furthermore, the podcast explores the defensive side of cybersecurity. Sama emphasizes the crucial role of awareness, training, and fostering a security-conscious culture within organizations. She discusses the significance of reporting and addressing security breaches promptly to mitigate potential damages. This episode is a must-listen for anyone interested in understanding the intricacies of cybersecurity, from the perspective of both attackers and defenders. Stay secure and vigilant with these expert insights into the ever-evolving landscape of digital threats.

Protect yourself from the evolving threat landscape – more episodes of Threat Vector are a click away

Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources
Get the latest news, invites to events, and threat alerts

By submitting this form, I understand my personal data will be processed in accordance with Palo Alto Networks Privacy Statement and Terms of Use.

Products and Services
  • AI-Powered Network Security Platform
  • Secure AI by Design
  • Prisma AIRS
  • AI Access Security
  • Cloud Delivered Security Services
  • Advanced Threat Prevention
  • Advanced URL Filtering
  • Advanced WildFire
  • Advanced DNS Security
  • Enterprise Data Loss Prevention
  • Enterprise IoT Security
  • Medical IoT Security
  • Industrial OT Security
  • SaaS Security
  • Next-Generation Firewalls
  • Hardware Firewalls
  • Software Firewalls
  • Strata Cloud Manager
  • SD-WAN for NGFW
  • PAN-OS
  • Panorama
  • Secure Access Service Edge
  • Prisma SASE
  • Application Acceleration
  • Autonomous Digital Experience Management
  • Enterprise DLP
  • Prisma Access
  • Prisma Browser
  • Prisma SD-WAN
  • Remote Browser Isolation
  • SaaS Security
  • AI-Driven Security Operations Platform
  • Cloud Security
  • Cortex Cloud
  • Application Security
  • Cloud Posture Security
  • Cloud Runtime Security
  • Prisma Cloud
  • AI-Driven SOC
  • Cortex XSIAM
  • Cortex XDR
  • Cortex XSOAR
  • Cortex Xpanse
  • Unit 42 Managed Detection & Response
  • Managed XSIAM
  • Next-Generation Identity Security
  • Privileged Access Management
  • Identity and Access Management
  • Endpoint Privilege Manager
  • Identity Governance
  • Workforce Password Management
  • Agentic Identities
  • Secrets Management
  • Unified Secrets Governance
  • Application Credentials Delivery
  • Vendor Privileged Access
  • Threat Intel and Incident Response Services
  • Proactive Assessments
  • Incident Response
  • Transform Your Security Strategy
  • Discover Threat Intelligence
Company
  • About Us
  • Careers
  • Contact Us
  • Corporate Responsibility
  • Customers
  • Investor Relations
  • Location
  • Newsroom
Popular Links
  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Manage Email Preferences
  • Products A-Z
  • Product Certifications
  • Report a Vulnerability
  • Sitemap
  • Tech Docs
  • Unit 42
  • Do Not Sell or Share My Personal Information
Palo Alto Networks Logo
  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Copyright © 2026 Palo Alto Networks. All Rights Reserved

  • Youtube
  • Podcast
  • Facebook
  • LinkedIn
  • Twitter
  • Select your language