
The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela
Three Buddy Problem
Exploring Telemetry Collection and Security Implications
This chapter delves into the workings of a keystroke-capturing implant used by cyber attackers, highlighting technical demonstrations with Vim and Perl. It also invites audience participation through a Twitter poll regarding the ethics of EDR vendors using similar implants for data collection.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.