CyberWire Daily cover image

Interpol scores against BEC, online fraud, and money laundering. Developments in C2C markets. Versioning vulnerability. Cyber war and cyber escalation.

CyberWire Daily

00:00

What's the Difference Between Detection and Mitigation?

The a p ts are really living off of the land, and they are using known vulnerabilities mostly. The tradition data sources that have been too noisy to look at, d and s. For example, if you go back to the solar ones attack, those actors used d and s as the main culprit for command ing control. They kept track of their victims using a d ga domain, subdomains,. Their intera structure was built around d n s.

Play episode from 19:10
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app