(no title)
LurkerAtTheGate | 10 months ago
Much of it is data analysis. My favorite examples of this are actual hacks - once foothold is established instead of encrypting & ransoming, the attacker just listens to the CEO/CFO. One hacked a law firm that handled some sizable mergers.
Personal tangent: Once had an opportunity to insider trade on a particular huge aerospace company. Playing a squad-based PvE game, matchmade into a team with 3 real-life friends at said company who chatted on in-game voice comms about their day, talking about court cases and senate hearings, and later panicked when they realized I could hear it all. They were nice guys, and I assured them that I wouldn't misuse what I overheard - I don't work in a relevant industry, and my investments do just fine without an illegal edge (plus I know Matt Levine's Laws of Insider Trading #1: Don't).
No comments yet.