goodlisten

Clip

Microsoft Uses Trademark Act Clause to Help with Takedown
listen on Spotify
1:03:26 - 1:06:07 (02:40)

Microsoft's legal team used a clause in the Lanham trademark act to seize counterfeit goods and help with the takedown of CNC servers. The legal argument was that these servers contained spam templates falsely claiming to be from Microsoft and Pfizer, constituting trademark infringement.

Similar Clips
The NSA worked with Microsoft to patch a Windows 10 security flaw, a cryptographic API bug, to prevent foreign governments from pilfering Americans' trusted information.
50:26 - 52:43 (02:17)
listen on Spotify
NSA
Summary

The NSA worked with Microsoft to patch a Windows 10 security flaw, a cryptographic API bug, to prevent foreign governments from pilfering Americans' trusted information. The collaboration may signal a shift in NSA policy, indicating that they will work with vendors to protect the country from new risks as the world changes.

Chapter
The Connection Between NSA, Microsoft, and WannaCry
Episode
57: MS08-067
Podcast
Darknet Diaries
The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry.
07:17 - 12:50 (05:32)
listen on Spotify
Cybersecurity
Summary

The malware EternalBlue exploited a vulnerability in Windows' server message block, leading to a rise in ransomware attacks and the spread of the worm WannaCry. The worm could easily spread to other computers by stealing usernames and passwords and using them to log in and infect other systems.

Chapter
The NotPetya Virus - Malware That Took Down Industry
Episode
54: NotPetya
Podcast
Darknet Diaries
The speaker shares their experience in identifying and investigating a cyberattack that was being carried out by a set of hackers across a variety of targets and expanding in scope every day, ultimately leading to the identification of a vulnerability.
31:35 - 35:42 (04:06)
listen on Spotify
Cybersecurity
Summary

The speaker shares their experience in identifying and investigating a cyberattack that was being carried out by a set of hackers across a variety of targets and expanding in scope every day, ultimately leading to the identification of a vulnerability.

Chapter
Wormable Vulnerability Exploited by Hackers
Episode
57: MS08-067
Podcast
Darknet Diaries
APT10, an advanced persistent threat (APT) group, stole personal confidential information, such as social security numbers and dates of birth, from over 100,000 US Navy personnel.
45:49 - 49:17 (03:27)
listen on Spotify
APT10
Summary

APT10, an advanced persistent threat (APT) group, stole personal confidential information, such as social security numbers and dates of birth, from over 100,000 US Navy personnel. The group targeted a Managed Services Provider (MSP) that stores, processes, and protects commercial data, including intellectual property and confidential business information, on behalf of its clients.

Chapter
Hackers Target MSPs to Gain Access to DoD Network
Episode
103: Cloud Hopper
Podcast
Darknet Diaries
Publicly available exploits for recently disclosed vulnerabilities can help ensure that security measures are actually functioning as intended, as otherwise nobody can protect themselves from undisclosed threats.
38:03 - 39:28 (01:24)
listen on Spotify
Cybersecurity
Summary

Publicly available exploits for recently disclosed vulnerabilities can help ensure that security measures are actually functioning as intended, as otherwise nobody can protect themselves from undisclosed threats.

Chapter
Uncovering Security Vulnerabilities
Episode
114: HD
Podcast
Darknet Diaries