
North Korea's biggest ever crypto heist: $1.4B stolen from Bybit
Three Buddy Problem
00:00
Analyzing Cyber Threats and Vulnerabilities
This chapter explores recent findings from Cisco Talos about the Salt Typhoon cyber threats, highlighting the exploitation of outdated vulnerabilities by attackers using simplistic methods. The speakers critique the report for its lack of depth and transparency, especially regarding which vulnerabilities are actively being exploited. They also discuss the broader implications of these findings on telecommunications security and the evolving tactics employed by cyber actors in targeting messaging services.
Transcript
Play full episode