
Sign up to save your podcasts
Or


[Referências do Episódio]
- Lockbit leak, research opportunities on tools leaked from TAs - https://securelist.com/lockbit-ransomware-builder-analysis/110370/
- Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection - https://www.bleepingcomputer.com/news/security/microsoft-stealthy-flax-typhoon-hackers-use-lolbins-to-evade-detection/
- Flax Typhoon using legitimate software to quietly access Taiwanese organizations - https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/
- Analysis of MS-SQL Server Proxyjacking Cases - https://asec.ahnlab.com/en/56350/
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
- Lockbit leak, research opportunities on tools leaked from TAs - https://securelist.com/lockbit-ransomware-builder-analysis/110370/
- Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection - https://www.bleepingcomputer.com/news/security/microsoft-stealthy-flax-typhoon-hackers-use-lolbins-to-evade-detection/
- Flax Typhoon using legitimate software to quietly access Taiwanese organizations - https://www.microsoft.com/en-us/security/blog/2023/08/24/flax-typhoon-using-legitimate-software-to-quietly-access-taiwanese-organizations/
- Analysis of MS-SQL Server Proxyjacking Cases - https://asec.ahnlab.com/en/56350/
Roteiro e apresentação: Carlos Cabral
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

171 Listeners

92 Listeners

83 Listeners

53 Listeners

32 Listeners

34 Listeners

169 Listeners

0 Listeners

37 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners