Click Here cover image

138. Almost every cyber attack begins with a key ingredient: an Infostealer

Click Here

00:00

Cybercrime Supply Chains and Info-Stealer Malware

The chapter explores cyber attacks on Ticketmaster and Airbus, focusing on the use of info-stealer malware to breach networks and obtain sensitive information like passwords. It discusses the threat posed by info-stealer families like Redline, Raccoon, Luma, and Medusa, outlining their methods of infiltration and data collection.

Play episode from 05:51
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app