Chapter
Inside Israel's Elite Intelligence Unit 8200
Hear about the unique training of Unit 8200, Israel's intelligence unit, which teaches young recruits to become experts in information manipulation and access. The unit's training includes both formal computer science studies and secret missions with intelligence agencies.
Clips
The speaker describes a selection process where he was chosen for a job out of 1000 people without knowing what the job was for, claiming that the interviewers knew better than him what he was best suited for.
02:34 - 04:21 (01:46)
Summary
The speaker describes a selection process where he was chosen for a job out of 1000 people without knowing what the job was for, claiming that the interviewers knew better than him what he was best suited for.
ChapterInside Israel's Elite Intelligence Unit 8200
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
A former 8200 unit soldier talks about the intensive training program and secrecy of Israel's military intelligence unit, which is responsible for collecting data intelligence and conducting cyber operations.
04:21 - 06:30 (02:08)
Summary
A former 8200 unit soldier talks about the intensive training program and secrecy of Israel's military intelligence unit, which is responsible for collecting data intelligence and conducting cyber operations.
ChapterInside Israel's Elite Intelligence Unit 8200
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
Lior Div worked on classified missions providing hacking, cracking, and reverse engineering services to intelligence agencies.
06:31 - 09:00 (02:29)
Summary
Lior Div worked on classified missions providing hacking, cracking, and reverse engineering services to intelligence agencies. He eventually became a cybersecurity CEO, having gained the majority of his knowledge through hands-on experience.
ChapterInside Israel's Elite Intelligence Unit 8200
Episode89: Cybereason - Molerats in the Cloud
PodcastDarknet Diaries
While DDoS attacks are often used to divert attention away from real hacking attempts, they can also provide an opportunity for hackers to install malware, gain access to sensitive information, and continue collecting data even after the attack has ended.
09:00 - 12:52 (03:51)
Summary
While DDoS attacks are often used to divert attention away from real hacking attempts, they can also provide an opportunity for hackers to install malware, gain access to sensitive information, and continue collecting data even after the attack has ended.