YusufOnSecurity.com

98 - Post-Compromise


Listen Later

Enjoying the content? Let us know your feedback!

It is often said, attacks are when and not if they will happen at all. However, when they happen what matters is how hard you fall, scope and recover.
In this week's episode,  I will talk about the steps taken by attackers  when they successfully breach organisations so that you can limit the damage and recover faster.

In addition, we will recap other  trending  security news  includes:

- https://www.redhat.com: RedHat started to sign its zip files
- https://www.sans.org: Holiday Hack Challenge
- https://attack.mitre.org: Techniques
- https://attack.mitre.org: TA0042
- https://www.cisa.gov/uscert: CISA Hunt and Incident Response Program (CHIRP) tool

Be sure to subscribe!  
 
If you like the content. Follow me @iayusuf or read my blog at [https://yusufonsecurity.com](https://yusufonsecurity.com/)  
 
You will find a list of all previous episodes in there too.

Be sure to subscribe!
You can also stream from https://yusufonsecurity.com
In there, you will find a list of all previous episodes in there too.

...more
View all episodesView all episodes
Download on the App Store

YusufOnSecurity.comBy YusufOnSecurity.Com


More shows like YusufOnSecurity.com

View all
The Daily by The New York Times

The Daily

111,115 Listeners