Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cyber Morning Call

650 - Truque de engenharia social é usado em ataques com o Lumma Stealer

21 Oct 2024

Description

[Referências do Episódio] [TREND MICRO NO FORRESTER] - https://www.trendmicro.com/explore/forrester-wave-xdr/01054-v1-en-www  Tricks and Treats: GHOSTPULSE’s new pixel- level deception - https://www.elastic.co/security-labs/tricks-and-treats  Unmasking Lumma Stealer : Analyzing Deceptive Tactics with Fake CAPTCHA - https://blog.qualys.com/vulnerabilities-threat-research/2024/10/20/unmasking-lumma-stealer-analyzing-deceptive-tactics-with-fake-captcha  New Bumblebee Loader Infection Chain Signals Possible Resurgence - https://www.netskope.com/blog/new-bumblebee-loader-infection-chain-signals-possible-resurgence  F5 fixed a high-severity elevation of privilege vulnerability in BIG-IP - https://securityaffairs.com/170022/security/f5-patches-big-ip-elevation-of-privilege-bug.html  ESET partner breached to send data wipers to Israeli orgs - https://www.bleepingcomputer.com/news/security/eset-partner-breached-to-send-data-wipers-to-israeli-orgs/  Analysis of the Crypt Ghouls group: continuing the investigation into a series of attacks on Russia - https://securelist.com/crypt-ghouls-hacktivists-tools-overlap-analysis/114217/  Roteiro e apresentação: Carlos Cabral e Bianca Oliveira Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.