Chapter

Identifying and Stopping an Attacker
A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network. They also noted that expired credit card numbers were a sign that the attacker hadn't been present for very long.
Clips
Invalid credit card numbers were exposed by malware during an investigation into transactions from several years ago.
18:29 - 21:30 (03:01)
Summary
Invalid credit card numbers were exposed by malware during an investigation into transactions from several years ago. Deduplication and verification were necessary to determine actual card numbers.
ChapterIdentifying and Stopping an Attacker
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
Mimecast is a specialized security solution for email and workplace collaboration that detects suspicious emails and offers an extra layer of protection to your inbox.
21:30 - 22:35 (01:05)
Summary
Mimecast is a specialized security solution for email and workplace collaboration that detects suspicious emails and offers an extra layer of protection to your inbox. It diversifies your security stack so that your business is not reliant on one generalized solution.
ChapterIdentifying and Stopping an Attacker
EpisodeEp 15: Ill Tills
PodcastDarknet Diaries
Learning to identify pivot points and artifacts can help catch hackers early before they cause major damage, and taking those points offline can stop them in their tracks.
22:35 - 26:07 (03:31)
Summary
Learning to identify pivot points and artifacts can help catch hackers early before they cause major damage, and taking those points offline can stop them in their tracks.