
Sign up to save your podcasts
Or


Welcome to Source Code: Decipher’s behind the scenes look at the weekly news with input from our sources. Topping the news this week, researchers detailed a ransomware operator that has repeatedly rebranded itself in order to evade detection. Also making headlines is a threat group’s use of a unique RAT, which can communicate directly with other compromised hosts via a peer-to-peer network. Finally, researchers are warning of a new phishing attack technique that leverages a legitimate RTF template functionality.
By Decipher4.4
99 ratings
Welcome to Source Code: Decipher’s behind the scenes look at the weekly news with input from our sources. Topping the news this week, researchers detailed a ransomware operator that has repeatedly rebranded itself in order to evade detection. Also making headlines is a threat group’s use of a unique RAT, which can communicate directly with other compromised hosts via a peer-to-peer network. Finally, researchers are warning of a new phishing attack technique that leverages a legitimate RTF template functionality.

3,056 Listeners

2,002 Listeners

3,152 Listeners

375 Listeners

1,020 Listeners

112,586 Listeners

8,008 Listeners

61 Listeners

74 Listeners

137 Listeners

46 Listeners

548 Listeners

549 Listeners

547 Listeners