CyberWire Daily cover image

Compromised military tech? [Research Saturday]

CyberWire Daily

00:00

Stonefly - What Happens When Something Like This Happens?

"It usually starts with a little bit of fragmentary evidence we find, uncover one, two or something the attacker does generates an alert," he says. "And then it's really kind of a case of am following the bread crumbs, m realizing, trying to figure out where this tool came from." Btbt wat was used to install.

Play episode from 13:57
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app