
Sign up to save your podcasts
Or


[Referências do Episódio]
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments - https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
Ransomware attackers introduce new EDR killer to their arsenal - https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/
A Deep Dive into a New ValleyRAT Campaign Targeting Chinese Speakers - https://www.fortinet.com/blog/threat-research/valleyrat-campaign-targeting-chinese-speakers
Tusk: unraveling a complex infostealer campaign - https://securelist.com/tusk-infostealers-campaign/113367/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
Leaked Environment Variables Allow Large-Scale Extortion Operation of Cloud Environments - https://unit42.paloaltonetworks.com/large-scale-cloud-extortion-operation/
Ransomware attackers introduce new EDR killer to their arsenal - https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/
A Deep Dive into a New ValleyRAT Campaign Targeting Chinese Speakers - https://www.fortinet.com/blog/threat-research/valleyrat-campaign-targeting-chinese-speakers
Tusk: unraveling a complex infostealer campaign - https://securelist.com/tusk-infostealers-campaign/113367/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

178 Listeners

168 Listeners

93 Listeners

80 Listeners

55 Listeners

33 Listeners

40 Listeners

166 Listeners

0 Listeners

36 Listeners

207 Listeners

15 Listeners

100 Listeners

1 Listeners

22 Listeners