goodlisten

Chapter

Possible Inexperienced Hacker Using Shadow Brokers' Hacks
listen on Spotify
43:31 - 50:29 (06:58)

The hacker who deleted their login events but not their logout events and may have cleared all event logs is believed to be inexperienced in using Shadow Brokers' hacks. Their intent may be to contest the NSA's most sophisticated hacking group and burn some of their costly exploits.

Clips
The Shadow Brokers, a group that published hacking tools stolen from the NSA, has gone quiet for over two years.
43:31 - 44:30 (00:59)
listen on Spotify
Hacking
Summary

The Shadow Brokers, a group that published hacking tools stolen from the NSA, has gone quiet for over two years. While it appears that Russia might be behind the group, no one knows for certain, and the hunt for the group's true identity and intentions continues.

Chapter
Possible Inexperienced Hacker Using Shadow Brokers' Hacks
Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The NSA is believed to have created a set of exploits that can bypass security on Microsoft Windows, but has kept them private and not reported them to the company.
44:31 - 46:33 (02:02)
listen on Spotify
Cybersecurity
Summary

The NSA is believed to have created a set of exploits that can bypass security on Microsoft Windows, but has kept them private and not reported them to the company. The group known as Shadow Brokers appears to have obtained these exploits and is now offering them for sale, demonstrating high-level capabilities.

Chapter
Possible Inexperienced Hacker Using Shadow Brokers' Hacks
Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The NSA may be keeping zero-day exploits to themselves to improve espionage and surveillance, which can be seen as defensive-minded, but a truly defensive-minded approach would involve working with software vendors to fix vulnerabilities.
46:33 - 48:45 (02:12)
listen on Spotify
NSA
Summary

The NSA may be keeping zero-day exploits to themselves to improve espionage and surveillance, which can be seen as defensive-minded, but a truly defensive-minded approach would involve working with software vendors to fix vulnerabilities. The Shadow Brokers' message may place the NSA under more scrutiny for hoarding these exploits.

Chapter
Possible Inexperienced Hacker Using Shadow Brokers' Hacks
Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The article discusses how to identify if a hacker is using Shadow Brokers hacks by understanding how windows logging works and identifying any abnormal deletion of logs.
48:45 - 50:29 (01:43)
listen on Spotify
Cybersecurity
Summary

The article discusses how to identify if a hacker is using Shadow Brokers hacks by understanding how windows logging works and identifying any abnormal deletion of logs.

Chapter
Possible Inexperienced Hacker Using Shadow Brokers' Hacks
Episode
53: Shadow Brokers
Podcast
Darknet Diaries