
Interpol scores against BEC, online fraud, and money laundering. Developments in C2C markets. Versioning vulnerability. Cyber war and cyber escalation.
CyberWire Daily
00:00
What's the Difference Between Detection and Mitigation?
The a p ts are really living off of the land, and they are using known vulnerabilities mostly. The tradition data sources that have been too noisy to look at, d and s. For example, if you go back to the solar ones attack, those actors used d and s as the main culprit for command ing control. They kept track of their victims using a d ga domain, subdomains,. Their intera structure was built around d n s.
Play episode from 19:10
Transcript


