
Sign up to save your podcasts
Or


[Referências do Episódio]
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer - https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
New attack uses MSC files and Windows XSS flaw to breach networks - https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
8220 Mining Gang's New Tool: k4spreader - https://blog.xlab.qianxin.com/8220-k4spreader-new-tool-en/
UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution - https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
By Tempest Security Intelligence[Referências do Episódio]
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer - https://www.cadosecurity.com/blog/from-dormant-to-dangerous-p2pinfect-evolves-to-deploy-new-ransomware-and-cryptominer
New attack uses MSC files and Windows XSS flaw to breach networks - https://www.bleepingcomputer.com/news/security/new-grimresource-attack-uses-msc-files-and-windows-xss-flaw-to-breach-networks/
8220 Mining Gang's New Tool: k4spreader - https://blog.xlab.qianxin.com/8220-k4spreader-new-tool-en/
UAC-0184 Abuses Python in DLL Sideloading for XWORM Distribution - https://cyble.com/blog/uac-0184-abuses-python-in-dll-sideloading-for-xworm-distribution/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia

178 Listeners

168 Listeners

93 Listeners

81 Listeners

54 Listeners

33 Listeners

40 Listeners

167 Listeners

0 Listeners

35 Listeners

206 Listeners

15 Listeners

100 Listeners

1 Listeners

22 Listeners