AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Shadow Brokers Hacking a Symmetrical Symmetry Group
Two a soc is usually quite a sight to see. They have lots of technicians or analysts sitting on desks with three or four monitors each analyzing alerts. On one of the monitors in this sock was a twitter feed. The tweet said, we follow equation group traffic. We find equation group source range. We hack equation group. We find many equation group sibr weapons. You see picture? We give you some equation group files free. You see this is good proof? No, you enjoy. You break many things. You find many intrusions. You write many badwo rs, but not all. That is hard to understand. Sounds like whoever wrote that english was not their first language.