
Sign up to save your podcasts
Or


[Referências do Episódio]
- CVE-2023-28252 -
Windows Common Log File System Driver Elevation of Privilege Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
- CVE-2023-28285 -
Microsoft Office Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285
- CVE-2023-28295 -
Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295
- CVE-2023-28287 -
Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287
- CVE-2023-28311 -
Microsoft Word Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311
- SAP Security Patch Day - April 2023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
- Schneider Electric - Cybersecurity Support Portal - https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
- Siemens Security Advisories - https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications
- Malware Disguised as Document from Ukraine's Energoatom Delivers Havoc Demon Backdoor - https://www.fortinet.com/blog/threat-research/malware-disguised-as-document-ukraine-energoatom-delivers-havoc-demon-backdoor
- Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/
- Exchange Server 2013 - https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2013urity Patch Day–April2023
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
By Tempest Security Intelligence[Referências do Episódio]
- CVE-2023-28252 -
Windows Common Log File System Driver Elevation of Privilege Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252
- CVE-2023-28285 -
Microsoft Office Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285
- CVE-2023-28295 -
Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295
- CVE-2023-28287 -
Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287
- CVE-2023-28311 -
Microsoft Word Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311
- SAP Security Patch Day - April 2023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
- Schneider Electric - Cybersecurity Support Portal - https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp
- Siemens Security Advisories - https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications
- Malware Disguised as Document from Ukraine's Energoatom Delivers Havoc Demon Backdoor - https://www.fortinet.com/blog/threat-research/malware-disguised-as-document-ukraine-energoatom-delivers-havoc-demon-backdoor
- Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/
- Exchange Server 2013 - https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2013urity Patch Day–April2023
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto

179 Listeners

173 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

171 Listeners

0 Listeners

36 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners