goodlisten

Clip

The Belgacom Cyber Attack
listen on Spotify
05:26 - 07:15 (01:49)

Belgacom, a major telecommunications company, experienced a malware attack which could have resulted in revenue loss and a damaged reputation. Fox IT was called in to handle the incident response.

Similar Clips
This article discusses the REGIN malware framework, a highly advanced and sophisticated toolkit believed to be the work of a nation-state actor.
31:09 - 36:15 (05:05)
listen on Spotify
REGIN
Summary

This article discusses the REGIN malware framework, a highly advanced and sophisticated toolkit believed to be the work of a nation-state actor. The malware has been targeting government agencies, financial institutions, research institutions, and telecoms companies across the world since at least 2009.

Chapter
REGIN Malware: Advanced and Sophisticated
Episode
Ep 48: Operation Socialist
Podcast
Darknet Diaries
The prevalence of hacking and the size of the global cyber economy continue to grow, making security measures and personal habits more important than ever.
1:30:31 - 1:32:34 (02:02)
listen on Spotify
Cybersecurity
Summary

The prevalence of hacking and the size of the global cyber economy continue to grow, making security measures and personal habits more important than ever. One non-obvious security habit is to cover the camera on one's device, as hackers can gain access even without the activity light turning on.

Chapter
Habits for Improved Security in the Startup World
Episode
Ep 48: Marc Goodman, FBI Futurist, on High-Tech Crime and How to Protect Yourself
Podcast
The Tim Ferriss Show
Hackers from GCHQ built a fake LinkedIn site, which was an exact replica of the real one, to deliver malicious software to victims' machines by responding quicker than the real one, fooling system administrators at Belgacom.
17:42 - 20:43 (03:00)
listen on Spotify
Cybersecurity
Summary

Hackers from GCHQ built a fake LinkedIn site, which was an exact replica of the real one, to deliver malicious software to victims' machines by responding quicker than the real one, fooling system administrators at Belgacom.

Chapter
Cyberattack targeting LinkedIn users
Episode
Ep 48: Operation Socialist
Podcast
Darknet Diaries
True Caller is a popular app that serves as a universal caller ID, identifying incoming calls and labeling them as suspicious if necessary.
33:10 - 34:31 (01:20)
listen on Spotify
True Caller
Summary

True Caller is a popular app that serves as a universal caller ID, identifying incoming calls and labeling them as suspicious if necessary. The app is highly valued and expected to have a big exit in the future.

Chapter
True Caller app can automatically contest parking tickets with a universal caller ID feature for cars
Episode
#47 - Robot Lawyers, Pay to Lose Weight & Prudent vs. Wild Card Managers
Podcast
My First Million
The speaker discusses how to collect information about targeted organizations through social media platforms like Facebook and LinkedIn.
08:47 - 10:59 (02:12)
listen on Spotify
Social Media, IT Security, Targeted Organization
Summary

The speaker discusses how to collect information about targeted organizations through social media platforms like Facebook and LinkedIn. It is important to seek out IT and security personnel to better understand the organization's technical infrastructure.

Chapter
Inside the World's Most Elite Hacking Team
Episode
Ep 10: Misadventures of a Nation State Actor
Podcast
Darknet Diaries