Podcast: Play in new window | Download (Duration: 22:57 — 42.3MB)
Subscribe: Apple Podcasts | Spotify | RSS
When Ransomware attacks begin spreading, how would officials go about finding the source? Most of the time, finding the culprit(s) behind cyber-attacks is a very challenging task. In this episode of Enterprise Linux Security, Joao and Jay discuss some methods that were recently used to de-anonymize ransomware domains.