
Sign up to save your podcasts
Or


[Referências do Episódio]
- 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers - https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
- Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts - https://blog.exatrack.com/melofee/
- Copy-paste heist or clipboard-injector attacks on cryptousers - https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
- Spyware vendors use 0-days and n-days against popular platforms - https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
By Tempest Security Intelligence[Referências do Episódio]
- 2023-03-29 // SITUATIONAL AWARENESS // CrowdStrike Tracking Active Intrusion Campaign Targeting 3CX Customers - https://www.reddit.com/r/crowdstrike/comments/125r3uu/20230329_situational_awareness_crowdstrike/
- Mélofée: a new alien malware in the Panda's toolset targeting Linux hosts - https://blog.exatrack.com/melofee/
- Copy-paste heist or clipboard-injector attacks on cryptousers - https://securelist.com/copy-paste-heist-clipboard-injector-targeting-cryptowallets/109186/
- Spyware vendors use 0-days and n-days against popular platforms - https://blog.google/threat-analysis-group/spyware-vendors-use-0-days-and-n-days-against-popular-platforms/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto

179 Listeners

173 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

171 Listeners

0 Listeners

36 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners