
Sign up to save your podcasts
Or


This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack
By Jim Love4.5
174174 ratings
This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack

186 Listeners

2,011 Listeners

370 Listeners

372 Listeners

652 Listeners

1,026 Listeners

318 Listeners

419 Listeners

8,075 Listeners

316 Listeners

195 Listeners

73 Listeners

139 Listeners

45 Listeners

167 Listeners