Click Here cover image

Erased: The curious case of UyghurEdit++

Click Here

00:00

How the malware trojan operated

Rebecca and Dina detail the malware's reconnaissance, keystroke logging, and multi-stage infection that would hand over full access.

Play episode from 11:10
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app