Interviewing The Leader behind one of the Most Secretive Cybercrime Teams

NetworkChuck · Beginner ·🔐 Cybersecurity ·5mo ago
Check out the main video: https://youtu.be/o-8amaZBi5M?si=c140uMbNC-GLhrsO I sat down with Alex Cosoi, the Chief Security Strategist at Bitdefender, and he revealed the most secretive team inside the company: Draco. This covert group quietly hunts some of the world’s most dangerous cybercriminals, assisting law enforcement in dismantling ransomware gangs, dark-web markets, and global criminal infrastructures. 🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy SUPPORT NETWORKCHUCK --------------------------------------------------- 🎓🎓 Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy ☕☕ COFFEE and MERCH: https://ntck.co/coffee 🌐🌐 Use the MOST SECURE Web Browser, NetworkChuck Cloud Browser: https://browser.networkchuck.com/ 🧠🧠 Use n8n, my favorite automation tool: https://ntck.co/n8n 🆘🆘 NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck STUDY WITH ME on Twitch: https://bit.ly/nc_twitch READY TO LEARN?? --------------------------------------------------- -Sign up for NetworkChuck Academy: https://ntck.co/NCAcademy -Get your CCNA: https://bit.ly/nc-ccna FOLLOW ME EVERYWHERE --------------------------------------------------- Instagram: https://www.instagram.com/networkchuck/ Twitter: https://twitter.com/networkchuck Facebook: https://www.facebook.com/NetworkChuck/ Join the Discord server: http://bit.ly/nc-discord Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!! “Inside Bitdefender’s Secret Draco Team” “How Bitdefender Helps Hunt Global Cybercriminals” “Meet the Covert Team Fighting Ransomware Worldwide” “Behind the Scenes with Bitdefender’s Cybercrime Hunters” “The Untold Story of Draco: Bitdefender’s Covert Cybercrime Unit” “How Law Enforcement Works with Bitdefender to Stop Hackers” “Taking Down Ransomware: Inside the Draco Investigations” “The Hidden Cybercrime War: What Bitdefender Really Does” “From GandCrab to REvil: Ho
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Playlist

Uploads from NetworkChuck (2) · NetworkChuck (2) · 34 of 37

1 how to NOT be a hacking noob in 2022 // ft. John Hammond
how to NOT be a hacking noob in 2022 // ft. John Hammond
NetworkChuck (2)
2 noobs Q&A with NetworkChuck and Cameron
noobs Q&A with NetworkChuck and Cameron
NetworkChuck (2)
3 He put all his money in NFTs and crypto // ft. Knox Hutchinson
He put all his money in NFTs and crypto // ft. Knox Hutchinson
NetworkChuck (2)
4 why David Bombal became a hacker
why David Bombal became a hacker
NetworkChuck (2)
5 How to go from a Hacking noob to a John Hammond
How to go from a Hacking noob to a John Hammond
NetworkChuck (2)
6 LINUX saved his life! // ft. Shawn Powers
LINUX saved his life! // ft. Shawn Powers
NetworkChuck (2)
7 Do I need to learn coding to be a Hacker?
Do I need to learn coding to be a Hacker?
NetworkChuck (2)
8 The best Linux distro to learn to become a hacker
The best Linux distro to learn to become a hacker
NetworkChuck (2)
9 What skills do I need to start hacking??
What skills do I need to start hacking??
NetworkChuck (2)
10 Does knowing networking make hacking easier??
Does knowing networking make hacking easier??
NetworkChuck (2)
11 What is a hacking CTF?
What is a hacking CTF?
NetworkChuck (2)
12 What does a threat analyst do?
What does a threat analyst do?
NetworkChuck (2)
13 Do CTFs prepare you to be hacker?
Do CTFs prepare you to be hacker?
NetworkChuck (2)
14 Ed Sheeran or Seth Rogen?
Ed Sheeran or Seth Rogen?
NetworkChuck (2)
15 The first thing to do when learning hacking
The first thing to do when learning hacking
NetworkChuck (2)
16 Cheating is okay (As long as you are learning)
Cheating is okay (As long as you are learning)
NetworkChuck (2)
17 talking with HakLuke (Hacker and creator of Hakrawler and other tools)
talking with HakLuke (Hacker and creator of Hakrawler and other tools)
NetworkChuck (2)
18 How to get a job in IT (according to the experts)
How to get a job in IT (according to the experts)
NetworkChuck (2)
19 Home Assistant made their own Alexa!!
Home Assistant made their own Alexa!!
NetworkChuck (2)
20 Is the NEW CompTIA A+ Exam Worth It? (220-1201 and 220-1202)
Is the NEW CompTIA A+ Exam Worth It? (220-1201 and 220-1202)
NetworkChuck (2)
21 How I Accidentally Created a Viral Meme Coin
How I Accidentally Created a Viral Meme Coin
NetworkChuck (2)
22 How I handle multiple Python Versions (pyenv)
How I handle multiple Python Versions (pyenv)
NetworkChuck (2)
23 how to host Open WebUI locally (self-hosted AI Hub)
how to host Open WebUI locally (self-hosted AI Hub)
NetworkChuck (2)
24 Turn Open WebUI into a real website (Domain + SSL)
Turn Open WebUI into a real website (Domain + SSL)
NetworkChuck (2)
25 How to Run n8n Locally (Full On-Premise Setup Tutorial)
How to Run n8n Locally (Full On-Premise Setup Tutorial)
NetworkChuck (2)
26 This Man Taught Me Everything I Know (Jeremy Cioara interview)
This Man Taught Me Everything I Know (Jeremy Cioara interview)
NetworkChuck (2)
27 The AI Attack Blueprint (Interview with Jason Haddix)
The AI Attack Blueprint (Interview with Jason Haddix)
NetworkChuck
28 The Telos Method Explained (ft. Daniel Miessler)
The Telos Method Explained (ft. Daniel Miessler)
NetworkChuck
29 How Long Do Network Engineers Have Left?
How Long Do Network Engineers Have Left?
NetworkChuck
30 Cisco's Certification Director Explains the Future of CCNA
Cisco's Certification Director Explains the Future of CCNA
NetworkChuck
31 From Engineer to YouTube Pioneer (David Bombal's Story)
From Engineer to YouTube Pioneer (David Bombal's Story)
NetworkChuck
32 They’re Teaching AI to Run the Data Center. Here’s How.
They’re Teaching AI to Run the Data Center. Here’s How.
NetworkChuck
33 Dark Web Expert Explains How He Infiltrates Cybercrime Forums
Dark Web Expert Explains How He Infiltrates Cybercrime Forums
NetworkChuck
Interviewing The Leader behind one of the Most Secretive Cybercrime Teams
Interviewing The Leader behind one of the Most Secretive Cybercrime Teams
NetworkChuck
35 Scam Researcher shows how he tricks scammers with AI
Scam Researcher shows how he tricks scammers with AI
NetworkChuck
36 He Hunts Malware for a living. Here's what he's most afraid of
He Hunts Malware for a living. Here's what he's most afraid of
NetworkChuck
37 Talk to Claude on 3CX Phone System Tutorial (Full Setup)
Talk to Claude on 3CX Phone System Tutorial (Full Setup)
NetworkChuck

Related AI Lessons

Stop trusting your agent skills with vibes. Eliminate the context security risk.
Learn to eliminate context security risks by using specific tools to audit package installations, rather than relying on intuition
Dev.to · Tessl
Investigating a Command Injection Attack — SOC168: Whoami Command Detected in Request Body |…
Learn to investigate Command Injection attacks using a real-world example on the LetsDefend SOC platform
Medium · Cybersecurity
pwning Facts
Learn to analyze nmap scan results to identify open ports and potential vulnerabilities in a system
Medium · Cybersecurity
Detecting Dangerous Shell Commands in Rust — Building a Safety Layer
Learn to detect dangerous shell commands in Rust and build a safety layer to prevent malicious activity
Dev.to · hiyoyo
Up next
Cryptography
Coursera
Watch →