
How did China get Microsoft's zero-day exploits?
Three Buddy Problem
00:00
Cybersecurity Tools Under Scrutiny
This chapter critiques the effectiveness of current cybersecurity tools, using a Yara rule as an example of declining standards. It also questions the promotional nature of reports from technology firms, particularly focusing on a Chainalysis blog post that lacks technical depth and misrepresents cybersecurity achievements.
Transcript
Play full episode