4.8 • 1K Ratings
🗓️ 12 October 2020
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | we saw that the attacker successfully deployed the attack framework on the targeted machines. |
0:05.0 | So the attackers could gain access to the supposed systems of the victim and still this personal |
0:10.0 | credit card data, which could become a serious breach. |
0:14.1 | Hi and welcome to malicious life in collaboration with Cyber Reason. |
0:24.6 | I'm Ran Levy. |
0:27.6 | In this episode of our show, you'll be hearing from three security experts. two members of Cyber Reasons' Manage Detection and |
0:35.6 | Response Team or MDR and one member of Cyber Reasons Threat Research Team. |
0:42.4 | They'll be telling the story of a malicious campaign |
0:45.4 | they stumbled upon last year involving Russian cyber criminals, POS devices and an |
0:51.8 | entire new family of a previously undisclosed the of stories in the logical order. First you uncover the threat, then investigate it and finally attempt to combat the attack. |
1:10.0 | In this episode, however, we'll do something a bit different. My name is Ellie. I'm a security analyst and a threat hunter at Cyberism for the last two years. |
1:28.0 | I'm Nive. I'm working with Cyberizant for the past three and I have years. |
1:34.0 | I'm practice director in the Global Services team. |
1:37.0 | I'm Lior and I'm a senior threat researcher at the |
1:41.0 | Nectonus steam in cyber reason, |
1:42.6 | specialised in mallewell analysis, threat hunting, and open source intelligence. |
1:47.0 | So our MDL is based on the cyber-driven product. |
1:56.0 | We have sensors that install on millions of endpoints around the world |
2:00.0 | what give us the visibility to perform wide research across different countries. |
2:05.0 | In every office we have analysts and threat hunters with wide experience coming from offensive and defensive world, |
2:11.0 | the analyst triaging cyber reasonreason alerts and performed deep dive analysis |
2:15.7 | using the investigation screen. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.