goodlisten

Clip

Adversaries Exploiting Windows Systems for Cryptomining
listen on Spotify
20:23 - 23:49 (03:26)

The adversary was using crypto-jacking software to mine cryptocurrencies on Windows systems they maintained and updated regularly. Despite efforts to advocate for removal, the business owners decided to allow the activity with additional monitoring.

Similar Clips
Zero day exploits are valuable to a number of buyers such as nation states or criminal groups.
13:37 - 18:23 (04:46)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

Zero day exploits are valuable to a number of buyers such as nation states or criminal groups. Hackers can make six figures by offering these exploits to contractors and keeping their mouths shut about the transaction.

Chapter
iOS Zero Day Exploits Easier to Find Than Android's
Episode
#266 – Nicole Perlroth: Cybersecurity and the Weapons of Cyberwar
Podcast
Lex Fridman Podcast
A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.
47:21 - 52:13 (04:52)
listen on Spotify
Network Security
Summary

A team spends time preparing for a network attack by learning about the network and pairing infrastructure with necessary exploits to attack targets such as servers, social media accounts, email addresses, bank accounts, and mobile accounts.

Chapter
Preparing for a Cyber Attack
Episode
Ep 50: Operation Glowing Symphony
Podcast
Darknet Diaries
The Conficker Worm, which was first discovered in 2008 and known for its ability to take control of a system remotely, is still present on 400,000 computers today, and is often used as a first hack in ethical hacking training due to its ease of use and effectiveness.
56:46 - 59:45 (02:59)
listen on Spotify
Cybersecurity
Summary

The Conficker Worm, which was first discovered in 2008 and known for its ability to take control of a system remotely, is still present on 400,000 computers today, and is often used as a first hack in ethical hacking training due to its ease of use and effectiveness.

Chapter
The Never-Ending Story of the Conficker Worm
Episode
57: MS08-067
Podcast
Darknet Diaries
The hack of a specific contract called the Dow DAO demonstrated that certain elites at the protocol level can exercise specific control over the system, where political control is a function of wealth in the system.
1:37:37 - 1:40:03 (02:26)
listen on SpotifyListen on Youtube
Blockchain
Summary

The hack of a specific contract called the Dow DAO demonstrated that certain elites at the protocol level can exercise specific control over the system, where political control is a function of wealth in the system.

Chapter
The Tradeoffs in Bailing Out Failed Contracts
Episode
#173 – Nic Carter: Bitcoin Core Values, Layered Scaling, and Blocksize Debates
Podcast
Lex Fridman Podcast
The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry.
07:17 - 12:50 (05:32)
listen on Spotify
Cybersecurity
Summary

The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry. The worm could easily spread to other computers by stealing usernames and passwords and using them to log in and infect other systems.

Chapter
The NotPetya Virus - Malware That Took Down Industry
Episode
54: NotPetya
Podcast
Darknet Diaries