The Cybersecurity Defenders Podcast cover image

#195 - Intel Chat: APT tunnelling, BadPilot, CVE-2025-0108, emojis & Kitty Stealer (take 2)

The Cybersecurity Defenders Podcast

CHAPTER

Exploiting Software Supply Chains

This chapter examines a report by Watchtower highlighting supply chain vulnerabilities that could surpass the SolarWinds incident. It discusses the risks posed by abandoned infrastructure and misconfigured repositories, emphasizing the need for robust dependency management to mitigate these threats.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner