Welcome to @ThreatNetPodcast, where I showcase how cyber attacks appear from a hacker's point of view.
I am Arik Atar, a Cyber Threat Hunter and Intelligence Researcher. In each episode, I will cover cyber threats and reveal how hackers work magic using screenshots from cyber criminals' marketplaces and forums.
This first episode is special about Mystic Stealer - an info-stealing malware capable of stealing all the passwords you store on your Chrome and anything but your shoes in less than a minute.
By the end of this episode, you will know:
1. Why is using your browser to manage and save passwords is a terrible idea?
2. Why the Two-factor authentication you enabled won't necessarily protect you from losing your accounts to hackers?
3. The entities behind the Malware-as-a-Service business model. Or, in simple words: Who stole your uncle's money just because he believed the IRS sent him a receipt for 50K$ "loyal citizen" tax refund
-----------------------------------------------------------------------------------
In the Next Episode I:
1. Scraped underground Telegram Channels of malware developers
2. Analyzed them into a malware-evolution-timeline
3. Use this timeline to demonstrate 6 emerging trends of Malware-as-a-Service operations.
4. Practical guide: fooling the next info-stealer you'll encounter & defend your credentials.
---------------------------------------------------------------------------------
X: @threatnetpod for live Cyber Threats updates
#malware #malwareanalysis #malwares #cybersecurity #threathunting #threatintelligence #cybersecurity #cyberdefense #cyberthreatintelligence #cyberthreats #cyberthreat #cyberresilience #behindthescenes #twofactorauthentication #stealers #cybercrime #cybercriminals #identitytheftprotection #compromised #cyberawareness #accountrecovery #malicious #osint #intelligence
Ещё видео!