PLAY PODCASTS
Shadow Networks: Inside the War on Bulletproof Hosting
Episode 358

Shadow Networks: Inside the War on Bulletproof Hosting

CISO Insights: Voices in Cybersecurity

December 20, 202514m 55s

Audio is streamed directly from the publisher (mcdn.podbean.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Delve into the clandestine industry of Bulletproof Hosting (BPH), where providers utilize sophisticated "infrastructure laundering" and corporate shell games to shield ransomware gangs from the law. We explore how these digital fortresses have evolved from physical bunkers to complex networks of jurisdictional arbitrage and "DMCA ignored" policies designed to frustrate investigators. Finally, learn how unprecedented international actions like Operation Endgame are striking back, seizing thousands of servers and shattering the myth of invulnerability surrounding these criminal safe havens.

 

https://breached.company/the-bulletproof-fortress-inside-the-shadowy-world-of-cybercrime-hosting-infrastructure

https://breached.company/operation-endgame-continues-crazyrdp-bulletproof-hoster-dismantled-as-dutch-police-seize-thousands-of-servers-in-coordinated-cybercrime-crackdown

www.hackernoob.tips/briefing-on-the-bulletproof-hosting-ecosystem

 

 

Sponsors:

www.breached.company

www.cisomarketplace.services