Microsoft Threat Intelligence Podcast cover image

Inside Microsoft’s Global Operation to Disrupt Lumma Stealer’s 2,300-Domain Malware Network

Microsoft Threat Intelligence Podcast

00:00

Navigating Legal Protocols in Cybersecurity Operations

This chapter explores the intricate processes organizations follow for account terminations, emphasizing the balance between legal requirements and policies. It also discusses Microsoft's strategies for managing domain seizures related to malware networks.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app