
Sign up to save your podcasts
Or


[Referências do Episódio]
- Tempest Vuln Watchlist - https://www.tempest.com.br/gerenciamento/threat-intelligence/vuln-watchlist/#contact
- SUPPLY CHAIN RISK FROM GIGABYTE APP CENTER BACKDOOR - https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/
- Dark Pink. Episode 2 - https://www.group-ib.com/blog/dark-pink-episode-2/
- CISA Adds One Known Exploited Vulnerability to Catalog - https://www.cisa.gov/news-events/alerts/2023/05/31/cisa-adds-one-known-exploited-vulnerability-catalog
- Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector - https://threatmon.io/reverse-engineering-rokrat-a-closer-look-at-apt37s-onedrive-based-attack-vector/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
By Tempest Security Intelligence[Referências do Episódio]
- Tempest Vuln Watchlist - https://www.tempest.com.br/gerenciamento/threat-intelligence/vuln-watchlist/#contact
- SUPPLY CHAIN RISK FROM GIGABYTE APP CENTER BACKDOOR - https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/
- Dark Pink. Episode 2 - https://www.group-ib.com/blog/dark-pink-episode-2/
- CISA Adds One Known Exploited Vulnerability to Catalog - https://www.cisa.gov/news-events/alerts/2023/05/31/cisa-adds-one-known-exploited-vulnerability-catalog
- Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector - https://threatmon.io/reverse-engineering-rokrat-a-closer-look-at-apt37s-onedrive-based-attack-vector/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto

179 Listeners

174 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

172 Listeners

0 Listeners

35 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners