
194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy
Breaking Badness
 00:00 
Exploiting AWS: Cyber Threat Tactics
This chapter examines strategies used by adversaries to exploit vulnerabilities in AWS-like infrastructures, highlighting a phishing scheme that targets Microsoft credentials through RDP files. It also assesses the threat levels of various tactics and the implications of these cyber activities on upcoming elections.
 Play episode from 23:19 
 Transcript 


