
Sign up to save your podcasts
Or


[Referências do Episódio]
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1 - https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-one
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2 - https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-two
MongoDB Security Notice - https://www.mongodb.com/alerts#mdb-modal-more
Whatsapp Spoofing impersonate of reply message - https://github.com/lichti/whats-spoofing
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 1 - https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-one
Mute the Sound: Chaining Vulnerabilities to Achieve RCE on Outlook: Pt 2 - https://www.akamai.com/blog/security-research/chaining-vulnerabilities-to-achieve-rce-part-two
MongoDB Security Notice - https://www.mongodb.com/alerts#mdb-modal-more
Whatsapp Spoofing impersonate of reply message - https://github.com/lichti/whats-spoofing
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

174 Listeners

91 Listeners

84 Listeners

53 Listeners

32 Listeners

35 Listeners

172 Listeners

0 Listeners

35 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners