
Sign up to save your podcasts
Or


[Referências do Episódio]
- BREAKING DOWN THE CASBANEIRO INFECTION CHAIN – PART II - https://blog.sygnia.co/breaking-down-casbaneiro-infection-chain-part2
- How User Account Control works - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works
- UAC Bypass – Fodhelper - https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/
- Advisory: Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability - https://www.mnemonic.io/resources/blog/ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability/
- CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability - https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US
- DECOY DOG IS NO ORDINARY PUPY: Separating a Sly DNS Malware from the Pack - https://insights.infoblox.com/resources-whitepaper/infoblox-whitepaper-decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns
- Researchers uncover a malware network possibly linked to nation-state cyberattacks - https://www.axios.com/2023/07/25/hidden-network-nation-state-cyberattacks
-
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
- BREAKING DOWN THE CASBANEIRO INFECTION CHAIN – PART II - https://blog.sygnia.co/breaking-down-casbaneiro-infection-chain-part2
- How User Account Control works - https://learn.microsoft.com/en-us/windows/security/application-security/application-control/user-account-control/how-it-works
- UAC Bypass – Fodhelper - https://pentestlab.blog/2017/06/07/uac-bypass-fodhelper/
- Advisory: Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability - https://www.mnemonic.io/resources/blog/ivanti-endpoint-manager-mobile-epmm-authentication-bypass-vulnerability/
- CVE-2023-35078 - Remote Unauthenticated API Access Vulnerability - https://forums.ivanti.com/s/article/CVE-2023-35078-Remote-unauthenticated-API-access-vulnerability?language=en_US
- DECOY DOG IS NO ORDINARY PUPY: Separating a Sly DNS Malware from the Pack - https://insights.infoblox.com/resources-whitepaper/infoblox-whitepaper-decoy-dog-is-no-ordinary-pupy-distinguishing-malware-via-dns
- Researchers uncover a malware network possibly linked to nation-state cyberattacks - https://www.axios.com/2023/07/25/hidden-network-nation-state-cyberattacks
-
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

173 Listeners

92 Listeners

83 Listeners

53 Listeners

32 Listeners

34 Listeners

170 Listeners

0 Listeners

37 Listeners

209 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners