Threat Vector by Palo Alto Networks cover image

The Art of Threat Hunting

Threat Vector by Palo Alto Networks

00:00

Threat Prioritization and Malware Insights

This chapter explores strategies for prioritizing threats in cybersecurity, taking into account vulnerabilities and global data metrics. It highlights the malicious capabilities of LumaSteeler, a credential-stealing malware, and discusses vulnerabilities in CUPS that can be exploited if not properly secured.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app