
Sign up to save your podcasts
Or


[Referências do Episódio]
Coyote Banking Trojan: A Stealthy Attack via LNK files - https://www.fortinet.com/blog/threat-research/coyote-banking-trojan-a-stealthy-attack-via-lnk-files
No need to RSVP: a closer look at the Tria Stealer campaign - https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
HTTP Client Tools Exploitation for Account Takeover Attacks - https://www.proofpoint.com/us/blog/threat-insight/http-client-tools-exploitation-account-takeover-attacks
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
Coyote Banking Trojan: A Stealthy Attack via LNK files - https://www.fortinet.com/blog/threat-research/coyote-banking-trojan-a-stealthy-attack-via-lnk-files
No need to RSVP: a closer look at the Tria Stealer campaign - https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/
HTTP Client Tools Exploitation for Account Takeover Attacks - https://www.proofpoint.com/us/blog/threat-insight/http-client-tools-exploitation-account-takeover-attacks
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

178 Listeners

174 Listeners

91 Listeners

83 Listeners

53 Listeners

30 Listeners

34 Listeners

170 Listeners

0 Listeners

32 Listeners

212 Listeners

16 Listeners

99 Listeners

1 Listeners

20 Listeners