Ouvir "Cyber Morning Call - #173 - 04/10/2022"
Sinopse do Episódio
[Referências do Episódio]
- Microsoft Exchange server zero-day mitigation can be bypassed - https://www.bleepingcomputer.com/news/security/microsoft-exchange-server-zero-day-mitigation-can-be-bypassed/
- New Pegasus Spyware Abuses Identified in Mexico - https://citizenlab.ca/2022/10/new-pegasus-spyware-abuses-identified-in-mexico/
- Phishing With Chromium's Application Mode - https://mrd0x.com/phishing-with-chromium-application-mode/?no-cache=1
- REVEALING EMPEROR DRAGONFLY: NIGHT SKY AND CHEERSCRYPT - A SINGLE RANSOMWARE GROUP - https://blog.sygnia.co/revealing-emperor-dragonfly-a-chinese-ransomware-group
- Bumblebee: increasing its capacity and evolving its TTPs - https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
- Microsoft Exchange server zero-day mitigation can be bypassed - https://www.bleepingcomputer.com/news/security/microsoft-exchange-server-zero-day-mitigation-can-be-bypassed/
- New Pegasus Spyware Abuses Identified in Mexico - https://citizenlab.ca/2022/10/new-pegasus-spyware-abuses-identified-in-mexico/
- Phishing With Chromium's Application Mode - https://mrd0x.com/phishing-with-chromium-application-mode/?no-cache=1
- REVEALING EMPEROR DRAGONFLY: NIGHT SKY AND CHEERSCRYPT - A SINGLE RANSOMWARE GROUP - https://blog.sygnia.co/revealing-emperor-dragonfly-a-chinese-ransomware-group
- Bumblebee: increasing its capacity and evolving its TTPs - https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.