
Soap Box: How to dismantle Volt Typhoon-style relay networks
Risky Business
00:00
Exploring Vulnerability Verification and Defensive Retaliation in Security
Exploring the process of verifying vulnerabilities through mass exploitation, including discussions on sensor clones, potential targets, and the vision of a responsive defense landscape against exploits.
Transcript
Play full episode