CyberWire Daily cover image

The OSINT revolution: How cyber and physical security teams are leveraging open source intelligence. [CyberWire-X]

CyberWire Daily

00:00

Is There an Infrastructure That the Bad Guys Use to Do These Influence Operations?

There is an infrastructure that the bad guys use to do these influence operations. And it sort of overlaps with what we cover in the minor attack framework. So there'd be certain things that a network defender could do to prevent that kind of thing from showing up on their users equipment. You can identify user IDs from social media, you know, form your employees that these are disrepetal people,. We could do those kinds of things.

Play episode from 13:04
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app