Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cyber Morning Call

619 - Grupo chinês ressurge com novo backdoor

04 Sep 2024

Description

[Referências do Episódio] Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion - https://www.trendmicro.com/en_us/research/24/i/earth-lusca-ktlvdoor.html  Earth Lusca - https://malpedia.caad.fkie.fraunhofer.de/actor/earth_lusca  Zyxel security advisory for OS command injection vulnerability in APs and security router devices - https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-os-command-injection-vulnerability-in-aps-and-security-router-devices-09-03-2024  APT Lazarus: Eager Crypto Beavers, Video calls and Games - https://www.group-ib.com/blog/apt-lazarus-python-scripts/  VMSA-2024-0018:VMware Fusion update addresses a code execution vulnerability (CVE-2024-38811) - https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24939 Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads - https://blog.talosintelligence.com/threat-actors-using-macropack/  ROADMAP TO ENHANCING INTERNET ROUTING SECURITY - https://www.whitehouse.gov/wp-content/uploads/2024/09/Roadmap-to-Enhancing-Internet-Routing-Security.pdf  Emansrepo Stealer: Multi-Vector Attack Chains - https://www.fortinet.com/blog/threat-research/emansrepo-stealer-multi-vector-attack-chains  DeFied Expectations — Examining Web3 Heists - https://cloud.google.com/blog/topics/threat-intelligence/examining-web3-heists/  Roteiro e apresentação: Carlos Cabral e Bianca Oliveira Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.