Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
July 09, 2025Legitimate Shellter Pen-Testing Tool Used in Malware Attacks2 minutesPlayA stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail....moreShareView all episodesBy RADIO007July 09, 2025Legitimate Shellter Pen-Testing Tool Used in Malware Attacks2 minutesPlayA stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail....more
A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail.
July 09, 2025Legitimate Shellter Pen-Testing Tool Used in Malware Attacks2 minutesPlayA stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail....more
A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail.