goodlisten

Clip

Understanding NOC and SOC in Network Security
listen on Spotify
17:12 - 18:18 (01:05)

A NOC is responsible for finding and fixing network faults, while a SOC is responsible for detecting and responding to security incidents. The NSA has both a NOC and a SOC to manage and defend their network against the large number of attacks that they receive.

Similar Clips
A group of computer security consultants would break into their clients' buildings to test their physical security systems.
09:33 - 14:07 (04:33)
listen on Spotify
Security
Summary

A group of computer security consultants would break into their clients' buildings to test their physical security systems. They utilized Raspberry Pi computers and calling cards to prove how far they had gotten into the buildings without being detected.

Chapter
Testing Corporate Security through Penetration Testing
Episode
95: Jon & Brian's Big Adventure
Podcast
Darknet Diaries
The Russian interference in elections seems to be more focused on political bickering than on understanding the national security problem.
1:23:58 - 1:27:34 (03:36)
listen on SpotifyListen on Youtube
Russian interference
Summary

The Russian interference in elections seems to be more focused on political bickering than on understanding the national security problem. Putin and his team seemed to understand how propaganda works and how to get maximum effect through performance.

Chapter
Understanding Russian Interference in US Elections
Episode
#335 – Fiona Hill: Vladimir Putin and Donald Trump
Podcast
Lex Fridman Podcast
The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.
24:10 - 27:04 (02:54)
listen on Spotify
Cybersecurity
Summary

The process of analyzing hacker targets involves building maps and clusters of where targets are located and what kind of businesses they work for to identify any commonalities between them and determine the motive behind the attacks.

Chapter
Target Analysis and Hacking Suspicions
Episode
79: Dark Basin
Podcast
Darknet Diaries
Security company purchased servers in Scranton to provide Intel on third-party security and validate suspicious activity.
59:53 - 1:03:26 (03:33)
listen on Spotify
Cybersecurity
Summary

Security company purchased servers in Scranton to provide Intel on third-party security and validate suspicious activity. Serves were used as a command and control point.

Chapter
Analysis of Affiliate Programs in Relation to Spam
Episode
110: Spam Botnets
Podcast
Darknet Diaries
Google utilized a trojan called PushDo to infect Windows computers and add them to a botnet, allowing for the Cutwell spam engine to send out mass volumes of spam emails from these machines.
18:13 - 20:20 (02:07)
listen on Spotify
Botnet
Summary

Google utilized a trojan called PushDo to infect Windows computers and add them to a botnet, allowing for the Cutwell spam engine to send out mass volumes of spam emails from these machines.

Chapter
Renting Out a Botnet on the Dark Web
Episode
110: Spam Botnets
Podcast
Darknet Diaries