
Risky Business #781 -- How Bybit oopsied $1.4bn
Risky Business
Hacking Techniques and Cybersecurity Insights
This chapter explores a sophisticated hacking technique targeting Cisco devices for credential theft and network infiltration, detailing methods like RADIUS and TACACs for extracting credentials. It also discusses current cybersecurity developments, including the effectiveness of EDR systems, hacker strategies, and notable data breaches, as well as cultural differences in threat intelligence reporting. The conversation emphasizes the complexities of threat attribution and the communication gaps within global cybersecurity efforts, encouraging further exploration of the topic.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.