
Sign up to save your podcasts
Or


[Referências do Episódio]
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer - https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
New attack uses MSC files and Windows XSS flaw to breach networks - https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
8220 Mining Gang's New Tool: k4spreader - https://blog.xlab.qianxin.com/8220-k4spreader-new-tool-en/
UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution - https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer - https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
New attack uses MSC files and Windows XSS flaw to breach networks - https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
8220 Mining Gang's New Tool: k4spreader - https://blog.xlab.qianxin.com/8220-k4spreader-new-tool-en/
UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution - https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

179 Listeners

173 Listeners

91 Listeners

83 Listeners

53 Listeners

30 Listeners

34 Listeners

173 Listeners

0 Listeners

36 Listeners

211 Listeners

16 Listeners

96 Listeners

1 Listeners

19 Listeners