Onboarding Cyber Criminals
The resume was great. The references checked out. After four video interviews, they thought they had found the perfect candidate for the job. They didn't realize that they were the job.
Learn moreThe Rise of Fraud in Higher Education
Ghost students are malicious actors who use aliases, false or stolen identities to apply to colleges. Their goal is to enroll and obtain ".edu" e-mail addresses and student accounts to gain internal access.
Vulnerability management, cyber intelligence, and security operations are a part of my everyday job. But analyzing and managing identity and access, especially when it comes to hunting down identity-based threats such as ghost students, is one of my main responsibilites here at this institution. I've sifted through my research projects and executive presentations for information I could share publicly. I then fed pieces of my reports and presentations about ghost students to artificial intelligence (AI) to create the following podcast audio.
Above is the link to a podcast created with my written work and generative AI voices (that are eerily human) from Google's NotebookLM.
Explore and read other posts here.
The resume was great. The references checked out. After four video interviews, they thought they had found the perfect candidate for the job. They didn't realize that they were the job.
Learn more
These identity-based, visual attacks have been known for their use in bullying and exploitation, but they're also being used to infiltrate Fortune 100 companies too.
Learn more