Hacking Humans cover image

The front lines of ransomware attacks.

Hacking Humans

00:00

Is There a Critical Vulnerability Exploitation?

Rohit Dhamonkar: RDP, phishing and critical vulnerability exploitation are the three he mentions. I would bet that probably 90% or more of the phishing of the ransomware attacks start with one of these three ways. The Hacking Humans podcast is proudly produced in Maryland at the StartUp studios of Data Tribe where they're co-building the next generation of cybersecurity teams and technologies.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app