
Artificial Intelligence Doxxing in Viral Videos, Billions of Usernames and Passwords Exposed, and a HATF Contest
Hacker And The Fed
Black Tech's Tactics for Network Persistence
They discuss how Black Tech uses firmware modification to maintain persistence in networks, intercept communications, and hide their actions. The chapter raises questions about the effectiveness of current detection capabilities against their tactics.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.