2min chapter

Changelog Master Feed cover image

Hacking with Go: Part 2 (Go Time #251)

Changelog Master Feed

CHAPTER

How to Deploy a Malware Detection Tool in an Infected Network

In a typical incident scenario, then you would have people that go into what we call forensics mode. They will collect all the hard drives that try to figure out exactly what happened inside the network. Some very stealthy attackers will decide that they would rather lose access and leave forensic traces on hard drive. Most of them feel like they would rather leave some kind of trace, knowing that most people don't look anyway.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode