

A Leaked Ransomware Negotiation, Twitter Security, And NSA Best Practices For Securing Your Home Network
Mar 2, 2023
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
Introduction
00:00 • 2min
Is There a Difference Between a Published Chat Log and a Ransomware Chat?
01:33 • 2min
The Bad Guys Are Not Just Criminals, They're Just Businesses, You Know?
03:29 • 4min
Is Lockbit a Russian Group?
07:15 • 2min
Do Not Negotiate With Terrorists
09:37 • 2min
Are Cyber Criminals Increasing Recruitment of Tech and IT Pros?
12:07 • 2min
How Do You Get Paid?
14:24 • 3min
You Know, I Need Help With a Dot Onion Website
17:23 • 3min
G2's Cloud Compliance Partner - Dratah
20:06 • 4min
Twitter and Elon - The Big Twitter Scam
23:49 • 3min
Is Twitter Trying to Phase Out SMS MFA?
26:46 • 2min
Is There a Way of Not Having a Twitter?
28:56 • 3min
Is Twitter Suffering That $60 Million a Year in SMS Fraud?
31:26 • 2min
Why Twitter Didn't Just Kill SMS MFA?
33:14 • 2min
The Best Practices for Securing Your Home Network
34:53 • 2min
How to Limit the External Attack Surface of Your Network Devices
36:43 • 2min
Do You Think Paranoid People Should Be Doing This?
38:57 • 2min
The Guest Network
41:00 • 5min