
Wide World of Cyber: How state adversaries attack security vendors
Risky Business
00:00
State Adversaries' Tactics Against EDR Systems
This chapter explores the methods used by state adversaries to identify vulnerabilities in endpoint detection and response (EDR) technologies. It examines the consequences of gaining access to administrative consoles and whether the aim is to disable protections or manipulate systems for malicious purposes.
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.