goodlisten

Chapter

The Second Dump by the Shadow Brokers
listen on Spotify
16:33 - 20:53 (04:19)

Researchers analyzed the list of IP addresses from the second dump by the Shadow Brokers, which claimed to be servers infected or used by the NSA for launching exploits, and looked for connections with clients through NetFlow data analysis.

Clips
The Shadow Brokers leaked NSA hacking tools which were initially put up for auction but only received $937 within the first 24 hours, much to their disappointment.
16:33 - 18:41 (02:08)
listen on Spotify
NSA Hacking Tools
Summary

The Shadow Brokers leaked NSA hacking tools which were initially put up for auction but only received $937 within the first 24 hours, much to their disappointment.

Chapter
The Second Dump by the Shadow Brokers
Episode
53: Shadow Brokers
Podcast
Darknet Diaries
The "Second Dump" from the Shadow Brokers, consisting of a list of IP addresses allegedly used by the NSA to infect or launch exploits from, generated interest from researchers who analyzed the data using NetFlow data from clients.
18:41 - 20:53 (02:11)
listen on Spotify
Cybersecurity
Summary

The "Second Dump" from the Shadow Brokers, consisting of a list of IP addresses allegedly used by the NSA to infect or launch exploits from, generated interest from researchers who analyzed the data using NetFlow data from clients.

Chapter
The Second Dump by the Shadow Brokers
Episode
53: Shadow Brokers
Podcast
Darknet Diaries