Remove How To Remove Military Remove Mining Remove Ransomware
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And they said that they really had no idea how to deal with and classify, you know, a package with over, 1000 pieces of or 1000 vulnerabilities. Ahmadi: If I were to attack, one thing I would probably do, going into the hacker mind for a minute, is I would try to figure out, not only how to attack the system. We let our guard down.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And they said that they really had no idea how to deal with and classify, you know, a package with over, 1000 pieces of or 1000 vulnerabilities. Ahmadi: If I were to attack, one thing I would probably do, going into the hacker mind for a minute, is I would try to figure out, not only how to attack the system. We let our guard down.

IT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

EP 49: LoL

ForAllSecure

Kyle Hanslovan CEO of Huntress Labs joins The Hacker Mind to discuss recent LoL attacks, specifically the Microsoft Follina attack and the Kaseya ransomware attack, and how important it is for small and medium sized businesses to start using enterprise grade security, given the evolving nature of these attacks. I'm Robert Vamosi.

article thumbnail

Author Q&A: The ongoing role of fortified structures in military clashes — and cybersecurity

The Last Watchdog

There’s no denying that castle walls play a prominent role in the histories of both military defense, going back thousands of years, and — as of the start of the current millennia — in cybersecurity. Betz You made an allusion to a modern military fortification with the Maginot Line.

Military 295