Microsoft Threat Intelligence Podcast cover image

Inside Microsoft’s Global Operation to Disrupt Lumma Stealer’s 2,300-Domain Malware Network

Microsoft Threat Intelligence Podcast

00:00

Navigating Legal Protocols in Cybersecurity Operations

This chapter explores the intricate processes organizations follow for account terminations, emphasizing the balance between legal requirements and policies. It also discusses Microsoft's strategies for managing domain seizures related to malware networks.

Play episode from 19:03
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app