3min chapter

Hacker And The Fed cover image

Zero-click Exploits Attacking iPhones, PC Motherboards Downloading Malware, and a New Dutch Mandate

Hacker And The Fed

CHAPTER

How CNC's Command and Control Is Used to Exploit Vulnerability

The exploit of vulnerability itself is usually quite complex. It may be multi-stage, but once the compromise happens, it tends to get a bit redundant when you start looking at all these different reports. A lot of these post intrusion scenarios always kind of end up in the same way. In some other cases, you might have your client, your email client, fetch the data itself and, you know, introduce the attack automatically to you. I'm not really sure you could even disable that.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode