QR codes were all but dead until smartphone companies started incorporating QR code scanners into their mobile phones back in 2017. Enter the COVID19 pandemic and the rise of the contactless economy, and the QR code is making a massive comeback. From advertising and restaurant menus to healthcare and agriculture – the use cases for QR codes are infinite.
QR codes are accessible, easy to produce and seemingly, here to stay. They’re also a perfect way for cyber criminals to snag your employee’s personal information.
Join Len Noe, CyberArk White Hat/BioHacker in this on demand webinar as he shares his latest research on QR code attacks and the risks facing enterprises. Attendees of this session will walk away with
-Examples of 3 simulated QR code attacks
-Tactics, Techniques, and Procedures (TTPs) used by QR code attackers
-Ways to protect yourself and your employees
-Implications for enterprise security teams and controls to have in place to prevent privilege escalation and lateral movement within the IT estate
Recommended for You

Discover how to simplify identity governance and administration (IGA) with our on-demand webinar, 'Modern IGA Made Simple.' Learn how automation, AI, and seamless integration can help you overcome man

Discover how automating User Access Reviews cuts manual effort by up to 80%, reduces audit fatigue, and strengthens compliance, all while saving time and costs.

Explore the evolving landscape of identity-based attacks and understand how cybercriminals adapt their strategies, while uncovering practical steps to strengthen your organization’s security posture.

Join CyberArk and Computacenter and learn how large organizations can enforce strong, scalable MFA strategies at the endpoint.

Explore how modern session management and Zero Standing Privilege strengthen PAM programs and support cloud, compliance, and hybrid work.

Join CyberArk and FIDO Alliance to explore how passkeys are redefining enterprise authentication.

Cloud’s evolution expands risk. Join CyberArk & IDC to explore platform engineering’s role in securing access, managing developer risk, and scaling defenses without slowing innovation.

A webinar to help you prepare for 47-day TLS certificate renewals. Learn to automate cert management, reduce risk, and build a scalable CLM strategy.

CyberArk Chief Strategy Officer Clarence Hinton explores trends, market dynamics and other issues shaping the 2025 identity security landscape.

Learn how unified PAM + IGA simplifies access reviews, cuts audit fatigue, and boosts security with Zero Standing Privileges.

Discover AI's risks and rewards in this CyberArk Labs webinar with real attacks, insights and tips for IT security leaders.

Secrets sprawl is growing fast. Join CyberArk experts to explore a practical, unified approach to securing secrets across modern cloud-native environments.

IGA experts discuss the evolving security perimeter amid growing applications, remote access, users, and permissions in today’s enterprise environments.

This presentation discusses Segregation of Duties risks, real-world failures like the Société Générale scandal, and showcases Zilla’s identity security platform.

Zilla’s talk explores the hidden risks of service accounts, offering guidance on managing and securing these often-overlooked non-human identities.

Zilla's tech talk presents AI-driven identity governance automation to streamline access reviews, provisioning, and identity operations.

Zilla and Guide Point leaders discuss key challenges and strategies for achieving effective identity management in modern cloud environments.

90% of identity leaders struggle with roles—this webinar explores an AI-driven, automated approach to delivering job-appropriate access at scale.

Zilla leaders and experts share 2025 IGA best practices and insights from a recent market research survey of identity leaders.

Discover how identity security can play a pivotal role in achieving and maintaining compliance on endpoints.