
Sign up to save your podcasts
Or
[Referências do Episódio]
- BREAKING DOWN THE CASBANEIRO INFECTION CHAIN – PART II - https://blog.sygnia.co/breaking-down-casbaneiro-infection-chain-part2
- How User Account Control works - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works
- UAC Bypass – Fodhelper - https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/
- Advisory: Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability - https://www.mnemonic.io/resources/blog/ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability/
- CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability - https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US
- DECOY DOG IS NO ORDINARY PUPY: Separating a Sly DNS Malware from the Pack - https://insights.infoblox.com/resources-whitepaper/infoblox-whitepaper-decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns
- Researchers uncover a malware network possibly linked to nation-state cyberattacks - https://www.axios.com/2023/07/25/hidden-network-nation-state-cyberattacks
-
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
[Referências do Episódio]
- BREAKING DOWN THE CASBANEIRO INFECTION CHAIN – PART II - https://blog.sygnia.co/breaking-down-casbaneiro-infection-chain-part2
- How User Account Control works - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works
- UAC Bypass – Fodhelper - https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/
- Advisory: Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability - https://www.mnemonic.io/resources/blog/ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability/
- CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability - https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US
- DECOY DOG IS NO ORDINARY PUPY: Separating a Sly DNS Malware from the Pack - https://insights.infoblox.com/resources-whitepaper/infoblox-whitepaper-decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns
- Researchers uncover a malware network possibly linked to nation-state cyberattacks - https://www.axios.com/2023/07/25/hidden-network-nation-state-cyberattacks
-
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
178 Listeners
172 Listeners
91 Listeners
82 Listeners
53 Listeners
27 Listeners
35 Listeners
162 Listeners
0 Listeners
29 Listeners
209 Listeners
15 Listeners
95 Listeners
2 Listeners
19 Listeners