Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Introduction
00:00 • 2min
Malvertizing via Google Ads
01:33 • 2min
Google Ads
03:10 • 2min
Do You Know What the Malware Guys Are Doing?
04:44 • 2min
Can a Signature Base System Be Effective in 2023?
06:16 • 2min
Detecting Infections
08:11 • 2min
Is It Better to Have a Signature Base AV System?
09:47 • 2min
Google Sponsored Links for Malware Sites
11:59 • 2min
Google Ads
13:49 • 2min
The Insta Checkmate and Truth Finder Data Breach
15:45 • 3min
How to Protect Your Employees From Phishing Attacks
18:19 • 2min
Hector, We Hacker in the Fed. We Love to Answer Your Questions
20:09 • 3min
The Ransomware Attack on Chronos
22:46 • 3min
The Timing of the Attack
26:07 • 2min
Are You Using Cloud-Based Services for Rapid Recovery?
28:24 • 4min
Can We Integrate AI Into Security and Automation?
32:32 • 3min
Do You Think AI Could Be Used Against Us in Cyber Security?
35:47 • 2min
Hacker Culture
38:01 • 3min
The Rise of Cryptocurrency
40:46 • 2min
Was There Ransomware Before Cryptocurrency?
43:13 • 4min