Risky Business cover image

Wide World of Cyber: How state adversaries attack security vendors

Risky Business

00:00

State Adversaries' Tactics Against EDR Systems

This chapter explores the methods used by state adversaries to identify vulnerabilities in endpoint detection and response (EDR) technologies. It examines the consequences of gaining access to administrative consoles and whether the aim is to disable protections or manipulate systems for malicious purposes.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app