
Vehicle Location Data Leaked For Over 2 million Drivers, Another US Government Breach, And D.B. Cooper
Hacker And The Fed
00:00
How to Avoid Viral Exploits in Social Engineering Campaigns
Hector: Did that force you to change your modus operandi for future attacks? Hector: It definitely motivated me to start purchasing or working to categorize domains. He says using a third party that is already documented or rather categorized still works very well today. The next question is from Rich, a former network engineer who wonders if software companies program exploits in when they write the code.
Transcript
Play full episode