goodlisten

Clip

Detecting and Preventing Exploits in Microsoft Word
listen on Spotify
17:16 - 19:49 (02:33)

The funnel for detecting exploits in Microsoft Word has gone from a billion reports a month to a few thousand by narrowing down attacks that occur when a user first opens a document. It is rare for exploits to occur when a user has been in Word for an extended period.

Similar Clips
A massive list of actual passwords was released after the fifth largest breach at the time, leading to an increase in password cracking methods and tools among hackers and security professionals.
26:10 - 28:34 (02:23)
listen on Spotify
Password Cracking
Summary

A massive list of actual passwords was released after the fifth largest breach at the time, leading to an increase in password cracking methods and tools among hackers and security professionals.

Chapter
The Dangers of Weak Passwords
Episode
Ep 33: RockYou
Podcast
Darknet Diaries
Eric Lawrence shares how his early internet shenanigans led him to accidentally create a tool for detecting cross-site scripting attacks, and how that ultimately led to a career in web security.
1:00:21 - 1:02:28 (02:07)
listen on Spotify
Web Security
Summary

Eric Lawrence shares how his early internet shenanigans led him to accidentally create a tool for detecting cross-site scripting attacks, and how that ultimately led to a career in web security.

Chapter
Becoming a Cybersecurity Consultant
Episode
78: Nerdcore
Podcast
Darknet Diaries
Microsoft's legal team used a clause in the Lanham trademark act to seize counterfeit goods and help with the takedown of CNC servers.
1:03:26 - 1:06:07 (02:40)
listen on Spotify
Microsoft
Summary

Microsoft's legal team used a clause in the Lanham trademark act to seize counterfeit goods and help with the takedown of CNC servers. The legal argument was that these servers contained spam templates falsely claiming to be from Microsoft and Pfizer, constituting trademark infringement.

Chapter
How Microsoft used trademark law to seize fake domains
Episode
110: Spam Botnets
Podcast
Darknet Diaries
Microsoft is developing its technology towards integrating its assistant into all its products, building its usage through stages such as the search feature and allowing conversation from all solutions.
42:21 - 48:35 (06:14)
listen on Spotify
Microsoft AI
Summary

Microsoft is developing its technology towards integrating its assistant into all its products, building its usage through stages such as the search feature and allowing conversation from all solutions. Improvements have been seen in auto response, moving towards a time it can automatically schedule a meeting for you.

Chapter
The path to a fully integrated assistant is about taking small steps
Episode
Kevin Scott: Microsoft CTO
Podcast
Lex Fridman Podcast
The hosts discuss the inner workings of a homebrew exploit toolkit and how it can evade detection by antivirus tools.
15:10 - 17:29 (02:19)
listen on Spotify
Cybersecurity
Summary

The hosts discuss the inner workings of a homebrew exploit toolkit and how it can evade detection by antivirus tools. They also explore the potential dangers of such a toolkit in the wrong hands.

Chapter
Evolution of Metasploit
Episode
114: HD
Podcast
Darknet Diaries