The Cybersecurity Defenders Podcast cover image

#195 - Intel Chat: APT tunnelling, BadPilot, CVE-2025-0108, emojis & Kitty Stealer (take 2)

The Cybersecurity Defenders Podcast

00:00

Exploiting Software Supply Chains

This chapter examines a report by Watchtower highlighting supply chain vulnerabilities that could surpass the SolarWinds incident. It discusses the risks posed by abandoned infrastructure and misconfigured repositories, emphasizing the need for robust dependency management to mitigate these threats.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app