Three Buddy Problem cover image

The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela

Three Buddy Problem

CHAPTER

Exploring Telemetry Collection and Security Implications

This chapter delves into the workings of a keystroke-capturing implant used by cyber attackers, highlighting technical demonstrations with Vim and Perl. It also invites audience participation through a Twitter poll regarding the ethics of EDR vendors using similar implants for data collection.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner