
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day
Three Buddy Problem
Evolving Cyber Threats and Tactics
This chapter explores the changing landscape of cyber threats, highlighting the deceptive tactics employed by groups like Star Blizzard that leverage broken QR codes for information theft. It also examines the challenges faced by tech companies in detecting these novel methods and discusses the broader implications of ongoing cyber warfare, particularly in the context of pro-Ukrainian attacks on Russian networks.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.