
Sign up to save your podcasts
Or


This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack
By Jim Love4.5
174174 ratings
This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack

187 Listeners

2,011 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

418 Listeners

8,077 Listeners

315 Listeners

195 Listeners

73 Listeners

139 Listeners

45 Listeners

168 Listeners