
Mysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacks
Three Buddy Problem
Navigating Cybersecurity Transparency
This chapter explores the delicate balance between sharing information about EDR software and protecting against adversaries in the cybersecurity community. It discusses the implications of transparency on security practices, the evolution of cyber exploitation techniques, and the complexities of communicating sensitive information. Additionally, it critiques the industry's reliance on major players like Google and examines the effects of Google’s acquisition of Mandiant on future cybersecurity efforts.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.