goodlisten

Clip

Incident Response and the Role of Mandiant
listen on Spotify
21:53 - 25:28 (03:35)

A former Mandiant employee helped her company respond to a security incident involving the network and server teams. The bank ultimately called Mandiant for additional support.

Similar Clips
A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.
30:51 - 35:06 (04:14)
listen on Spotify
Ring, security
Summary

A security expert shares his concerns about the recent data leak at Ring, where hackers posted over a thousand usernames and passwords of the company's customers, along with their addresses, and the potential harm such information can cause.

Chapter
Ring camera users’ security breached
Episode
108: Marq
Podcast
Darknet Diaries
A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.
05:09 - 06:50 (01:41)
listen on Spotify
Cybersecurity
Summary

A hacker gained access to the entire user database of VTech, a company that produces educational toys and gadgets for children, compromising sensitive personal information of millions of users, including first and last names, email addresses, encrypted passwords, secret questions and answers, home addresses, and IP addresses.

Chapter
Hacker breaches children's personal data for their own protection
Episode
Ep 2: The Peculiar Case of the VTech Hacker
Podcast
Darknet Diaries
The speaker talks about the vulnerability of personal information to hackers and how they can easily access it outside someone's house using a van.
11:10 - 12:31 (01:20)
listen on SpotifyListen on Youtube
Cybersecurity
Summary

The speaker talks about the vulnerability of personal information to hackers and how they can easily access it outside someone's house using a van. Recent incidents of data breaches and hacking have made people more paranoid about their privacy and security.

Chapter
Privacy Issues with Face Manipulation Applications
Episode
Hire 1 to Hire 10, Sam Gets Hacked, Shaan Buys a $200K NFT, and More with Andrew Wilkinson
Podcast
My First Million
The speaker discusses their immediate response to a security breach, focusing on next steps and forensics.
38:35 - 40:12 (01:37)
listen on Spotify
Security, Response
Summary

The speaker discusses their immediate response to a security breach, focusing on next steps and forensics. They identify and fix the vulnerability and take responsibility for their actions.

Chapter
Bare Minimum Cybersecurity Practices Can Lead to Disaster
Episode
Ep 42: Mini-Stories: Vol 2
Podcast
Darknet Diaries
The speaker analyzes the accounts and activity on a police department server and discovers an active logged-in account with potential access to private and sensitive information.
23:42 - 27:23 (03:40)
listen on Spotify
Cybersecurity
Summary

The speaker analyzes the accounts and activity on a police department server and discovers an active logged-in account with potential access to private and sensitive information. The speaker raises concerns with the police chief about who else has access to the server.

Chapter
Potential Security Breach at a Police Department
Episode
96: The Police Station Incident
Podcast
Darknet Diaries