
Sign up to save your podcasts
Or


This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack
By Jim Love4.6
169169 ratings
This episode reports on infected versions of popular business apps circulating on the internet, attackers are getting into Kubernetes access control and the impact of the X_Trader supply chain attack

186 Listeners

2,004 Listeners

370 Listeners

374 Listeners

637 Listeners

1,022 Listeners

322 Listeners

415 Listeners

8,020 Listeners

314 Listeners

189 Listeners

73 Listeners

137 Listeners

45 Listeners

170 Listeners