To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.
An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Caitlin Hopkins, Diana Duvieilh, and Anna Seitz to discuss the latest trends in ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. Welcome in! You’ve entered, Only Malware in the ...
Software designed to prevent cheating in video games. "anti-cheat software" on the Word Notes podcast.
In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. On Hacking Humans, Dave Bittner, Joe Carrigan, ...
A kind of side-channel attack in which an attacker with physical access to a device retrieves encryption keys after a cold reboot of the system. A computer is "cold booted" when its power is quickly ...
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Exploitation of a bug, oversight, or misconfiguration to gain access to information from which one would normally be excluded. A privilege escalation attack elevates the attacker's level of access to ...
A forensic technique where practitioners capture an entire image of a system and analyze the contents offline. "dead-box forensics" on the Word Notes podcast.