Risky Business cover image

Wide World of Cyber: How state adversaries attack security vendors

Risky Business

00:00

State Adversaries' Tactics Against EDR Systems

This chapter explores the methods used by state adversaries to identify vulnerabilities in endpoint detection and response (EDR) technologies. It examines the consequences of gaining access to administrative consoles and whether the aim is to disable protections or manipulate systems for malicious purposes.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner