Risky Business cover image

Risky Business #781 -- How Bybit oopsied $1.4bn

Risky Business

CHAPTER

Hacking Techniques and Cybersecurity Insights

This chapter explores a sophisticated hacking technique targeting Cisco devices for credential theft and network infiltration, detailing methods like RADIUS and TACACs for extracting credentials. It also discusses current cybersecurity developments, including the effectiveness of EDR systems, hacker strategies, and notable data breaches, as well as cultural differences in threat intelligence reporting. The conversation emphasizes the complexities of threat attribution and the communication gaps within global cybersecurity efforts, encouraging further exploration of the topic.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner