Home
Categories
EXPLORE
Comedy
True Crime
Society & Culture
History
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/b1/9c/8a/b19c8a8d-25c1-fd22-6949-a4f8098acac6/mza_16051839896976153321.jpg/600x600bb.jpg
Cybersecurity Mentors Podcast
Cybersecurity Mentors
47 episodes
1 week ago
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
Show more...
Technology
Education,
Business,
Careers,
Self-Improvement
RSS
All content for Cybersecurity Mentors Podcast is the property of Cybersecurity Mentors and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
Show more...
Technology
Education,
Business,
Careers,
Self-Improvement
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/b1/9c/8a/b19c8a8d-25c1-fd22-6949-a4f8098acac6/mza_16051839896976153321.jpg/600x600bb.jpg
Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 2
Cybersecurity Mentors Podcast
52 minutes
2 weeks ago
Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 2
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
Cybersecurity Mentors Podcast
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...