Go Time: Golang, Software Engineering cover image

Hacking with Go: Part 2

Go Time: Golang, Software Engineering

00:00

How to Deploy a Malware Detection Tool in an Infected Network

In a typical incident scenario, then you would have people that go into what we call forensics mode. They will collect all the hard drives that try to figure out exactly what happened inside the network. Some very stealthy attackers will decide that they would rather lose access and leave forensic traces on hard drive. Most of them feel like they would rather leave some kind of trace, knowing that most people don't look anyway.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner