Go Time: Golang, Software Engineering cover image

Hacking with Go: Part 2

Go Time: Golang, Software Engineering

00:00

How to Deploy a Malware Detection Tool in an Infected Network

In a typical incident scenario, then you would have people that go into what we call forensics mode. They will collect all the hard drives that try to figure out exactly what happened inside the network. Some very stealthy attackers will decide that they would rather lose access and leave forensic traces on hard drive. Most of them feel like they would rather leave some kind of trace, knowing that most people don't look anyway.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app