Remove tags executive-buy-in
article thumbnail

How to trace ransomware payments end-to-end

Elie

This series of three blog posts summarizes the key findings of our large-scale study. This blog post, the first in the series, explains the methodology and techniques we developed to trace ransomware payments end-to-end. Chainanalysis. , final post. We presented the findings discussed in these posts at. Blackhat USA this summer. ,

article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome. An Official Provider, as a Premium Partner, is not a sponsorship and no company can buy their way into the NOC for any amount of money. Building the Hacker Summer Camp network, by Evan Basta. The Buck Stops Here.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Since then Hash started a reverse engineering wiki site called Recessim and created dozens of YouTube videos in a channel of that same name to chronicle his adventures. He joins The Hacker Mind to talk about his journey, about mesh networks, and even glitching. Like any true hacker, this isn’t his day job; this is his passion.