
194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy
Breaking Badness
00:00
Exploiting AWS: Cyber Threat Tactics
This chapter examines strategies used by adversaries to exploit vulnerabilities in AWS-like infrastructures, highlighting a phishing scheme that targets Microsoft credentials through RDP files. It also assesses the threat levels of various tactics and the implications of these cyber activities on upcoming elections.
Transcript
Play full episode