
Threat Trends: UNC3524 - Eye Spy on Your Email
The Defender's Advantage Podcast
Detecting a Thread Actor Intruder in a Home Security System
The adversary also took the care to utilize compromise iot devices outside the victim environment. One of the first commanding control ip addresses we found turned out to be an innernet accessible video conferencig camera. We don't have any reason to believe that there's a supply chain like angle to this. For them to function as the attackers hot point or se to address, they need to be inaccessible - which they're not supposed to be by design.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.