
194. Locate X Unleashed & APT29’s Latest Gambit: The Battle for Digital Privacy
Breaking Badness
Exploiting AWS: Cyber Threat Tactics
This chapter examines strategies used by adversaries to exploit vulnerabilities in AWS-like infrastructures, highlighting a phishing scheme that targets Microsoft credentials through RDP files. It also assesses the threat levels of various tactics and the implications of these cyber activities on upcoming elections.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.