
138. Almost every cyber attack begins with a key ingredient: an Infostealer
Click Here
00:00
Cybercrime Supply Chains and Info-Stealer Malware
The chapter explores cyber attacks on Ticketmaster and Airbus, focusing on the use of info-stealer malware to breach networks and obtain sensitive information like passwords. It discusses the threat posed by info-stealer families like Redline, Raccoon, Luma, and Medusa, outlining their methods of infiltration and data collection.
Play episode from 05:51
Transcript


