
A Massive Ongoing Ransomware Attack, Google Claims to Catch Chinese Hackers, and the Feds Arrest a Russian Hacker in Arizona
Hacker And The Fed
How to Be a Red Teamer When Part of Your Infrastructure Lives on a Third Party Vendor
Some pen testing companies will put it in their contract that you are liable, you know, at least from the perspective of the contract. You want to make sure that any assets that you have that belong on a third party vendors environment, you make sure that third party vendor knows you're about to do pen tests and even get permission to writing. The consequences would be that unfortunately someone like a Chris gets a call from AWS saying, hey, we're having hacking attempts and we got this guy's home IP address. And what's he going to pull out to Chris? A contract that says, hey, these other guys hired me. So now it's just a whole big cluster.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.