Chapter
Clips
The NSA uses various hacking methods to intercept information, including installing malware like Cottonmouth or Rage Master on a target's device, intercepting shipped Cisco firewalls to install their own firmware, and using software like Dropout Jeep to gain access to iPhones.
01:58 - 04:07 (02:08)
Summary
The NSA uses various hacking methods to intercept information, including installing malware like Cottonmouth or Rage Master on a target's device, intercepting shipped Cisco firewalls to install their own firmware, and using software like Dropout Jeep to gain access to iPhones.
ChapterCloud Compliance and Hacking Campaigns
Episode53: Shadow Brokers
PodcastDarknet Diaries
Darknet Diaries reveals the true story of the NSA's elite hacking force, Tau, which is now known as Computer Network Operations.
04:07 - 05:21 (01:14)
Summary
Darknet Diaries reveals the true story of the NSA's elite hacking force, Tau, which is now known as Computer Network Operations. Researchers give hackers a unique code name for hacking campaigns, and the NSA's cyber unit has been given the name Equation Group.
ChapterCloud Compliance and Hacking Campaigns
Episode53: Shadow Brokers
PodcastDarknet Diaries
Drata provides continuous monitoring and visibility into an organization's risk, security controls, and audit readiness for various compliance standards.
05:21 - 07:00 (01:38)
Summary
Drata provides continuous monitoring and visibility into an organization's risk, security controls, and audit readiness for various compliance standards. With 14 native frameworks, automated custom controls, risk management solutions, and 75 native integrations, Drata is a trusted compliance partner for many organizations.
ChapterCloud Compliance and Hacking Campaigns
Episode53: Shadow Brokers
PodcastDarknet Diaries
The guest has decades of experience in cybersecurity and discusses the various services provided by a managed security operations center including incident response, digital forensics, security architecture, and international work.
07:00 - 08:38 (01:38)
Summary
The guest has decades of experience in cybersecurity and discusses the various services provided by a managed security operations center including incident response, digital forensics, security architecture, and international work.