Chapter

How Hackers Conduct Targeted Attacks
listen on Spotify
10:59 - 16:36 (05:37)

Hackers can spend weeks collecting information about a target organization to gain intelligence on its systems and protocols, and then deploy tools and exploits undetected by the organization's antivirus and security software, enabling them to access sensitive data.

Clips
The speaker describes how his team spends weeks collecting information about their target organization to plan for a cyber attack using undetectable exploits.
10:59 - 16:36 (05:37)
listen on Spotify
Cybersecurity
Summary

The speaker describes how his team spends weeks collecting information about their target organization to plan for a cyber attack using undetectable exploits.

Chapter
How Hackers Conduct Targeted Attacks
Episode
Ep 10: Misadventures of a Nation State Actor
Podcast
Darknet Diaries