AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Introduction
Explore the discovery of a backdoor in the XE vulnerability, addressing software flaws, open-source trust model abuse, time-specific breach details, upcoming content previews, and virtual audience interactions.
We're breaking down the attack: how it works, how it was hidden, and why time was running out for the attacker.
Sponsored By:
Links:
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode