
Risky Business #783 -- Evil webcam ransomwares entire Windows network
Risky Business
Intelligence Sharing and Addressing Legacy Network Vulnerabilities
This chapter explores the critical role of intelligence sharing in military support, particularly regarding the U.S. assistance to Ukraine, and its impact on civilian safety. It also delves into cybersecurity issues, focusing on the vulnerabilities of the NTLM authentication protocol and strategies for mitigating risks in modern networks.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.