
Sign up to save your podcasts
Or


Welcome to Source Code: Decipher’s behind the scenes look at the weekly news with input from our sources. Topping the news this week, researchers detailed a ransomware operator that has repeatedly rebranded itself in order to evade detection. Also making headlines is a threat group’s use of a unique RAT, which can communicate directly with other compromised hosts via a peer-to-peer network. Finally, researchers are warning of a new phishing attack technique that leverages a legitimate RTF template functionality.
Support the show
By Decipher4.4
99 ratings
Welcome to Source Code: Decipher’s behind the scenes look at the weekly news with input from our sources. Topping the news this week, researchers detailed a ransomware operator that has repeatedly rebranded itself in order to evade detection. Also making headlines is a threat group’s use of a unique RAT, which can communicate directly with other compromised hosts via a peer-to-peer network. Finally, researchers are warning of a new phishing attack technique that leverages a legitimate RTF template functionality.
Support the show

3,062 Listeners

2,007 Listeners

3,144 Listeners

371 Listeners

1,020 Listeners

112,031 Listeners

8,064 Listeners

61 Listeners

74 Listeners

139 Listeners

44 Listeners

545 Listeners

568 Listeners

594 Listeners

892 Listeners