
Sign up to save your podcasts
Or
This cybersecurity podcast episode explains network exfiltration, the process where attackers steal data from compromised systems. It details common targets like PII and intellectual property, along with various methods used to extract data, including HTTP/S uploads, DNS tunneling, and cloud storage abuse. The episode also covers techniques for detecting and preventing exfiltration, such as SIEM monitoring and data loss prevention, and provides a real-world case study illustrating an attack. Ultimately, the podcast emphasizes proactive security measures to identify and stop data theft.
This cybersecurity podcast episode explains network exfiltration, the process where attackers steal data from compromised systems. It details common targets like PII and intellectual property, along with various methods used to extract data, including HTTP/S uploads, DNS tunneling, and cloud storage abuse. The episode also covers techniques for detecting and preventing exfiltration, such as SIEM monitoring and data loss prevention, and provides a real-world case study illustrating an attack. Ultimately, the podcast emphasizes proactive security measures to identify and stop data theft.