From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.…
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
Learn more abo…
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
Learn more a…
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim'…
The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
Learn more about your ad choi…
The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
Learn more about your ad choices. Visit megaphone.fm/adc…
A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
Learn more about y…
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
Lea…
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run…
An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.
Learn more ab…
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.
Learn more about your ad choices. Visi…
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.
Learn more about your ad choices. Visit megap…
A clandestine set of applications designed to give hackers access and control over a target device.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Information used by leadership to make decisions regarding the cybersecurity posture of their organization.
Learn more about your ad choices. Visit megaphone.fm/adchoices
In this case Identity is the set of credentials, usually electronic that vouch for who you are and theft is to steal. The theft of a person's identity for purposes of fraud.
Learn more about your ad …
A probability simulation technique used to understand the impact of risk and uncertainty in complex problems.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A software, hardware or hybrid encryption layer between two devices on the network that makes the traffic between the sites opaque to the other devices on the same network.
Learn more about your ad c…
00:06:25 |
Tue 27 Feb 2024
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.