
Sign up to save your podcasts
Or


In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advice: resilience, empathy, and people-first communication matter as much as tools.
ANU Breach Report
Suthagar Seevaratnam’s LinkedIn
Send us fan mail via text
By Cybersecurity Mentors5
44 ratings
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advice: resilience, empathy, and people-first communication matter as much as tools.
ANU Breach Report
Suthagar Seevaratnam’s LinkedIn
Send us fan mail via text

228,837 Listeners

178 Listeners

314 Listeners

189 Listeners

137 Listeners

29,210 Listeners

19 Listeners

3 Listeners