Public Key cover image

Blockchain Investigations and Illicit Threats Emerging In Crypto Ecosystem

Public Key

00:00

How to Detect a Hacker Using Twitter D M

"I had a bit of a personal experience with this a couple of week ends ago. There was a platform compromise, and one of our coll leagues got a twitter d m from somebody involved," he says. "And obviously they were urgently trying to get in touch with us. Like ye said, time was of the essence."

Play episode from 14:34
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app