
Sign up to save your podcasts
Or


[Referências do Episódio]
- CVE-2022-42889 Text4Shell : une vulnérabilité de type exécution de code à distance qui affecte le logiciel Apache Commons Text - https://cyberwatch.fr/cve/cve-2022-42889-text4shell-comment-detecter-et-corriger-cette-vulnerabilite-sur-apache-commons-text/
- New UEFI rootkit Black Lotus offered for sale at $5,000 - https://securityaffairs.co/wordpress/137252/malware/black-lotus-uefi-rootkit.html
- Tweet de Germán Fernández sobre o SystemBC - https://twitter.com/1ZRR4H/status/1582068501036273665
- Free Micropatches For Bypassing "Mark of the Web" on Unzipped Files (0day) - https://blog.0patch.com/2022/10/free-micropatches-for-bypassing-mark-of.html
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
By Tempest Security Intelligence[Referências do Episódio]
- CVE-2022-42889 Text4Shell : une vulnérabilité de type exécution de code à distance qui affecte le logiciel Apache Commons Text - https://cyberwatch.fr/cve/cve-2022-42889-text4shell-comment-detecter-et-corriger-cette-vulnerabilite-sur-apache-commons-text/
- New UEFI rootkit Black Lotus offered for sale at $5,000 - https://securityaffairs.co/wordpress/137252/malware/black-lotus-uefi-rootkit.html
- Tweet de Germán Fernández sobre o SystemBC - https://twitter.com/1ZRR4H/status/1582068501036273665
- Free Micropatches For Bypassing "Mark of the Web" on Unzipped Files (0day) - https://blog.0patch.com/2022/10/free-micropatches-for-bypassing-mark-of.html
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto

179 Listeners

173 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

171 Listeners

0 Listeners

36 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners