Ouvir "Cyber Morning Call - #130 - 02/08/2022"
Sinopse do Episódio
[Referências do Episódio]
- How Leaked Twitter API Keys Can be Used to Build a Bot Army - https://cloudsek.com/whitepapers_reports/how-leaked-twitter-api-keys-can-be-used-to-build-a-bot-army/
- Cyberactivist Group Killnet Declares War on Lockheed Martin - https://sputniknews.com/20220801/cyberactivist-group-killnet-declares-war-on-lockheed-martin-1097998322.html
- Space Invaders: Cyber Threats That Are Out Of This World - https://blog.bushidotoken.net/2022/07/space-invaders-cyber-threats-that-are.html
- Vulnerability Spotlight: How misusing properly serialized data opened TCL LinkHub Mesh Wi-Fi system to 17 vulnerabilities - https://blog.talosintelligence.com/2022/08/vulnerability-spotlight-how-misusing.html?utm_source=pocket_mylist
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
- How Leaked Twitter API Keys Can be Used to Build a Bot Army - https://cloudsek.com/whitepapers_reports/how-leaked-twitter-api-keys-can-be-used-to-build-a-bot-army/
- Cyberactivist Group Killnet Declares War on Lockheed Martin - https://sputniknews.com/20220801/cyberactivist-group-killnet-declares-war-on-lockheed-martin-1097998322.html
- Space Invaders: Cyber Threats That Are Out Of This World - https://blog.bushidotoken.net/2022/07/space-invaders-cyber-threats-that-are.html
- Vulnerability Spotlight: How misusing properly serialized data opened TCL LinkHub Mesh Wi-Fi system to 17 vulnerabilities - https://blog.talosintelligence.com/2022/08/vulnerability-spotlight-how-misusing.html?utm_source=pocket_mylist
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.