Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

57: MS08-067

57: MS08-067

FromDarknet Diaries


57: MS08-067

FromDarknet Diaries

ratings:
Length:
62 minutes
Released:
Jan 21, 2020
Format:
Podcast episode

Description

Hear what goes on internally when Microsoft discovers a major vulnerability within Windows.
Guest
Thanks to John Lambert for sharing this story with us.
Sponsors
Support for this episode comes from ProCircular. Use the team at ProCircular to conduct security assessments, penetration testing, SIEM monitoring, help with patches, or do incident response. Visit www.procircular.com/ to learn more.
This episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
Sources

https://blogs.technet.microsoft.com/johnla/2015/09/26/the-inside-story-behind-ms08-067/

https://www.justice.gov/opa/pr/payment-processor-scareware-cybercrime-ring-sentenced-48-months-prison

https://www.nytimes.com/2019/06/29/opinion/sunday/conficker-worm-ukraine.html

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601

https://www.wired.com/story/nsa-windows-10-vulnerability-disclosure/

Book: Worm

Attribution
Darknet Diaries is created by Jack Rhysider.
Episode artwork by odibagas.
Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Released:
Jan 21, 2020
Format:
Podcast episode

Titles in the series (100)

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.