Chapter
Zero Day Exploits and Nation State Actors
The use of zero-day exploits, often by nation-state actors, is a major security concern due to their sophistication and the difficulty in detection. Limited resources and the need to protect privacy further complicate addressing the issue.
Clips
Looking for zombie bugs in firmware code of devices is a process of finding the root of an issue.
31:35 - 36:14 (04:38)
Summary
Looking for zombie bugs in firmware code of devices is a process of finding the root of an issue. Though this usually requires a large amount of resources, time, and resources to sift through code lines, other methods like looking at the history of that file patch can be used.
ChapterZero Day Exploits and Nation State Actors
Episode127: Maddie
PodcastDarknet Diaries
Maddie and the team at Google's Project Zero discovered a watering hole attack through an activated traffic website and worked relentlessly with vendors to squash the bugs before more people could be infected.
36:14 - 37:42 (01:28)
Summary
Maddie and the team at Google's Project Zero discovered a watering hole attack through an activated traffic website and worked relentlessly with vendors to squash the bugs before more people could be infected.
ChapterZero Day Exploits and Nation State Actors
Episode127: Maddie
PodcastDarknet Diaries
The high number of zero days and their sophistication points to a nation state actor responsible for the attacks.
37:42 - 41:03 (03:20)
Summary
The high number of zero days and their sophistication points to a nation state actor responsible for the attacks. The zero days are effective in avoiding detection and the actor in question used approximately 11 exploits over the course of a year.
ChapterZero Day Exploits and Nation State Actors
Episode127: Maddie
PodcastDarknet Diaries
The speaker believes in creating a world where there is safe and secure access to the Internet while protecting privacy, with a focus on zero-day and zero-day exploit space, with hopes to contribute positively in the industry.
41:03 - 43:20 (02:17)
Summary
The speaker believes in creating a world where there is safe and secure access to the Internet while protecting privacy, with a focus on zero-day and zero-day exploit space, with hopes to contribute positively in the industry.