Chapter
Clips
Malware implants were not compatible with the latest version of Windows causing odd behavior that was very visible to the user.
23:33 - 25:22 (01:49)
Summary
Malware implants were not compatible with the latest version of Windows causing odd behavior that was very visible to the user.
ChapterDealing with Cybersecurity Issues in the Workplace
EpisodeEp 10: Misadventures of a Nation State Actor
PodcastDarknet Diaries
A sophisticated and fully featured implant had already been deployed onto the network when an alert notifying them of being caught on a network went off; this raised concerns across senior leadership of the agencies and government due to the political blowback that they would face if things went wrong while trying to keep deploying further surveillance efforts.
25:23 - 26:27 (01:03)
Summary
A sophisticated and fully featured implant had already been deployed onto the network when an alert notifying them of being caught on a network went off; this raised concerns across senior leadership of the agencies and government due to the political blowback that they would face if things went wrong while trying to keep deploying further surveillance efforts.
ChapterDealing with Cybersecurity Issues in the Workplace
EpisodeEp 10: Misadventures of a Nation State Actor
PodcastDarknet Diaries
A focus on the options available to a company facing a security breach, including either writing out the technical problems or trying to delete them, both of which come with their own unique risks and difficulties.
26:27 - 28:32 (02:05)
Summary
A focus on the options available to a company facing a security breach, including either writing out the technical problems or trying to delete them, both of which come with their own unique risks and difficulties. The speaker also discusses the importance of communication and coordination throughout the company in such situations.
ChapterDealing with Cybersecurity Issues in the Workplace
EpisodeEp 10: Misadventures of a Nation State Actor
PodcastDarknet Diaries
The last thing we would want in cybersecurity is to have a wider presence on the network.
28:32 - 31:22 (02:50)
Summary
The last thing we would want in cybersecurity is to have a wider presence on the network. An unidentified implant could be causing issues and appear as entirely non-deterministic.