Public Key cover image

Blockchain Investigations and Illicit Threats Emerging In Crypto Ecosystem

Public Key

00:00

How to Detect a Hacker Using Twitter D M

"I had a bit of a personal experience with this a couple of week ends ago. There was a platform compromise, and one of our coll leagues got a twitter d m from somebody involved," he says. "And obviously they were urgently trying to get in touch with us. Like ye said, time was of the essence."

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app