
Sign up to save your podcasts
Or


[Referências do Episódio]
- 2022 Top Routinely Exploited Vulnerabilities - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
- 「Royal」と似た挙動を行う新たなランサムウェア「BlackSuit」を分析 - https://www.trendmicro.com/ja_jp/research/23/h/investigating-blacksuit-ransomwares-similarities-to-royal.html
- Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners - https://thehackernews.com/2023/08/malicious-apps-use-sneaky-versioning.html
- Demystifying Mysterious Team Bangladesh - https://www.group-ib.com/blog/mysterious-team-bangladesh/
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
- 2022 Top Routinely Exploited Vulnerabilities - https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
- 「Royal」と似た挙動を行う新たなランサムウェア「BlackSuit」を分析 - https://www.trendmicro.com/ja_jp/research/23/h/investigating-blacksuit-ransomwares-similarities-to-royal.html
- Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners - https://thehackernews.com/2023/08/malicious-apps-use-sneaky-versioning.html
- Demystifying Mysterious Team Bangladesh - https://www.group-ib.com/blog/mysterious-team-bangladesh/
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

173 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

171 Listeners

0 Listeners

36 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners