Description
[Referências do Episódio]
CUPS flaws enable Linux remote code execution, but there’s a catch - https://www.bleepingcomputer.com/news/security/cups-flaws-enable-linux-remote-code-execution-but-theres-a-catch/
HPE patches three critical security holes in Aruba PAPI - https://www.theregister.com/2024/09/26/hpe_aruba_patch_papi/
Storm-0501: Ransomware attacks expanding to hybrid cloud environments - https://www.microsoft.com/en-us/security/blog/2024/09/26/storm-0501-ransomware-attacks-expanding-to-hybrid-cloud-environments/
Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0 - https://go.recordedfuture.com/hubfs/reports/mtp-2024-0926.pdf
Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse - https://www.elastic.co/security-labs/betting-on-bots
Nexe Backdoor Unleashed: Patchwork APT Group’s Sophisticated Evasion of Defenses - https://cyble.com/blog/nexe-backdoor-unleashed-patchwork-apt-groups-sophisticated-evasion-of-defenses/
Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam - https://blog.talosintelligence.com/simple-mail-transfer-pirates/
Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy - https://unit42.paloaltonetworks.com/kimsuky-new-keylogger-backdoor-variant/
Wallet Scam: A Case Study in Crypto Drainer Tactics - https://research.checkpoint.com/2024/walletconnect-scam-a-case-study-in-crypto-drainer-tactics/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia