Chapter

Hias: Identifying Infrastructure for Cyberattacks
listen on Spotify
32:40 - 39:21 (06:41)

Hias focuses on cyber threat intelligence to identify infrastructure utilized by adversaries for attacks. By analyzing domains and identifying the relationships between attackers and infrastructure providers, they aim to prevent cyberattacks before they occur.

Clips
The intention of malware is to be stealthy and hide and it is a mistake for cybercriminals to create something without considering the end results.
32:40 - 34:51 (02:11)
listen on Spotify
Malware Creation, Botnets
Summary

The intention of malware is to be stealthy and hide and it is a mistake for cybercriminals to create something without considering the end results.

Chapter
Hias: Identifying Infrastructure for Cyberattacks
Episode
94: Mariposa
Podcast
Darknet Diaries
Hias focuses on identifying the infrastructure used by adversaries to set up botnets and various attacks before they occur by monitoring domain lookups and cash refreshes to identify compromised computers within a network.
34:51 - 39:21 (04:30)
listen on Spotify
Botnets
Summary

Hias focuses on identifying the infrastructure used by adversaries to set up botnets and various attacks before they occur by monitoring domain lookups and cash refreshes to identify compromised computers within a network.

Chapter
Hias: Identifying Infrastructure for Cyberattacks
Episode
94: Mariposa
Podcast
Darknet Diaries