goodlisten

Episode

Ep 15: Ill Tills
listen on Spotify
35:21
Published: Sun Apr 01 2018
Description

A major retailer was hacked. Their point of sales machines were riddled with malware. Listen to hear how digital forensics and incident responders handled the situation. What malware was found? Where was it found? How was it stopped? And most importantly, how much data was leaked? Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
DRADA offers continuous monitoring and risk visibility for compliance standards such as SOC 2, ISO 27001, GDPR, HIPAA, and more, streamlining compliance for over 14 frameworks and automating custom frameworks and controls.
00:00 - 04:06 (04:06)
listen on Spotify
DRADA Cloud Compliance
Summary

DRADA offers continuous monitoring and risk visibility for compliance standards such as SOC 2, ISO 27001, GDPR, HIPAA, and more, streamlining compliance for over 14 frameworks and automating custom frameworks and controls. Many security professionals from companies such as Notion, Lemonade, and Bamboo HR have relied on DRADA as their compliance partner.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
A credit card's data theft was discovered through a malware that was used to write to a specific file extension.
04:06 - 10:21 (06:15)
listen on Spotify
Malware
Summary

A credit card's data theft was discovered through a malware that was used to write to a specific file extension. The credit card company has contacted the retail store responsible for this purchase point.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
Criminals are using various tactics such as cloning credit card information and malware to exploit vulnerabilities in payment systems in order to withdraw cash or launder money through gift cards.
10:21 - 18:29 (08:07)
listen on Spotify
Credit Card Fraud
Summary

Criminals are using various tactics such as cloning credit card information and malware to exploit vulnerabilities in payment systems in order to withdraw cash or launder money through gift cards. The vulnerability of the systems makes it hard for companies to distinguish between genuine and false alerts when suspicious activity is detected.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network.
18:29 - 26:07 (07:37)
listen on Spotify
Cybersecurity
Summary

A team was able to find and stop every pivot point and backdoor created by an attacker, preventing any more credit cards from leaving the network. They also noted that expired credit card numbers were a sign that the attacker hadn't been present for very long.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
This transcript discusses the after-effects of cybersecurity breaches, as well as the impact they can have on the individuals whose information has been stolen.
26:07 - 33:08 (07:01)
listen on Spotify
Cybersecurity
Summary

This transcript discusses the after-effects of cybersecurity breaches, as well as the impact they can have on the individuals whose information has been stolen.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries
The discovery of a new strain of malware disrupted operations at multiple major companies.
33:08 - 35:35 (02:26)
listen on Spotify
Cybersecurity
Summary

The discovery of a new strain of malware disrupted operations at multiple major companies. The malware utilized a multi-stage attack to evade detection, posing a significant threat to businesses and individuals alike.

Episode
Ep 15: Ill Tills
Podcast
Darknet Diaries