goodlisten

Clip

A Case of Advanced Persistent Threat
listen on Spotify
37:34 - 40:36 (03:01)

After an initial infection, a threat actor gained access to a company's domain controller, giving them full admin access over the network and leaving the business at their mercy.

Similar Clips
A detective investigates a police department ransomware attack that caused 10 months of lost work and searches for the hacker's IP address for clues on their identity and motive.
36:01 - 37:47 (01:46)
listen on Spotify
Cybersecurity
Summary

A detective investigates a police department ransomware attack that caused 10 months of lost work and searches for the hacker's IP address for clues on their identity and motive.

Chapter
Mayor's Home Computer Connected to Police Department Server
Episode
96: The Police Station Incident
Podcast
Darknet Diaries
Security breaches must be communicated to management immediately, even if the details of the breach are not yet fully understood.
24:21 - 30:25 (06:04)
listen on Spotify
Security breaches
Summary

Security breaches must be communicated to management immediately, even if the details of the breach are not yet fully understood. The consequences of the breach must be made clear and management must take steps to control the situation from all perspectives.

Chapter
Importance of Immediate Management Action in Response to Malware Detection
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
Digital Forensics Analysts are trained to spot anomalies that could be malicious, but to do so, they must know how a computer and its processes should normally behave.
14:24 - 15:32 (01:07)
listen on Spotify
Digital Forensics
Summary

Digital Forensics Analysts are trained to spot anomalies that could be malicious, but to do so, they must know how a computer and its processes should normally behave.

Chapter
Accessing Networks through Jump Servers
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
A hacking expert speculates that it's technically possible for US Cyber Command to decrypt the private chat messages of ISIS media via stealing the private decryption keys of their phones.
17:34 - 22:09 (04:34)
listen on Spotify
US Cyber Command
Summary

A hacking expert speculates that it's technically possible for US Cyber Command to decrypt the private chat messages of ISIS media via stealing the private decryption keys of their phones.

Chapter
The Power of Cyber Command in War
Episode
Ep 50: Operation Glowing Symphony
Podcast
Darknet Diaries
A senior security engineer investigates a server issue and goes beyond the surface level checks to find a root shell that was open.
27:34 - 28:59 (01:24)
listen on Spotify
Security Engineering
Summary

A senior security engineer investigates a server issue and goes beyond the surface level checks to find a root shell that was open.

Chapter
Network Security and Bash History Investigation
Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries