
Sign up to save your podcasts
Or


[Referências do Episódio]
How the Sys:All Loolhole Allowed Us To Penetrate GKE in Production - https://orca.security/resources/blog/sys-all-google-kubernetes-engine-risk-example/
NSPX30: A sophisticated AitM-enabled implant evolving since 2005 - https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
How the Sys:All Loolhole Allowed Us To Penetrate GKE in Production - https://orca.security/resources/blog/sys-all-google-kubernetes-engine-risk-example/
NSPX30: A sophisticated AitM-enabled implant evolving since 2005 - https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

171 Listeners

92 Listeners

83 Listeners

53 Listeners

32 Listeners

34 Listeners

169 Listeners

0 Listeners

37 Listeners

210 Listeners

16 Listeners

95 Listeners

1 Listeners

19 Listeners