
Compromised military tech? [Research Saturday]
CyberWire Daily
00:00
Stonefly - What Happens When Something Like This Happens?
"It usually starts with a little bit of fragmentary evidence we find, uncover one, two or something the attacker does generates an alert," he says. "And then it's really kind of a case of am following the bread crumbs, m realizing, trying to figure out where this tool came from." Btbt wat was used to install.
Play episode from 13:57
Transcript


