
Sign up to save your podcasts
Or
𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
📈 Find our infographics and receive your
𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
📈 Find our infographics and receive your