Breaking Badness cover image

194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy

Breaking Badness

CHAPTER

Exploiting AWS: Cyber Threat Tactics

This chapter examines strategies used by adversaries to exploit vulnerabilities in AWS-like infrastructures, highlighting a phishing scheme that targets Microsoft credentials through RDP files. It also assesses the threat levels of various tactics and the implications of these cyber activities on upcoming elections.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner