Risky Business cover image

Risky Business #783 -- Evil webcam ransomwares entire Windows network

Risky Business

CHAPTER

Intelligence Sharing and Addressing Legacy Network Vulnerabilities

This chapter explores the critical role of intelligence sharing in military support, particularly regarding the U.S. assistance to Ukraine, and its impact on civilian safety. It also delves into cybersecurity issues, focusing on the vulnerabilities of the NTLM authentication protocol and strategies for mitigating risks in modern networks.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner