Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Inhoud geleverd door Exploit Brokers. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Exploit Brokers of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !
Ga offline met de app Player FM !
HN30 - Digital Intruders: The Complex Web of APTs Against ASEAN
MP3•Thuis aflevering
Manage episode 409218758 series 3144149
Inhoud geleverd door Exploit Brokers. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Exploit Brokers of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digital attacks, leveraging malware, phishing emails, and zero-day vulnerabilities to infiltrate and spy on Southeast Asian countries. We unravel the complexities of these cyber operations, examining the implications for regional security and the global fight against digital crime. From brute force attacks to the subtle nuances of cyber warfare, join us as we shed light on the unseen battles shaping our digital landscape. Don't forget to subscribe, hit the bell icon, and like this video for more insightful content on cybersecurity threats and defenses. 🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age. ### Sources * Hacker News Reporting on Chinese Apt Actors : https://thehackernews.com/2024/03/two-chinese-apt-groups-ramp-up-cyber.html * Unit 42 Report: https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/ * Original KeyScrambler: https://www.qfxsoftware.com/features/ * Pwn2Own rewards: https://www.securityweek.com/200000-awarded-at-pwn2own-2024-for-tesla-hack/ #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #ASEAN #MustangPanda #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty
…
continue reading
40 afleveringen
MP3•Thuis aflevering
Manage episode 409218758 series 3144149
Inhoud geleverd door Exploit Brokers. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Exploit Brokers of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
In this thrilling episode of our cybersecurity series, we dive deep into the shadowy world of cyber espionage waged by two Chinese Advanced Persistent Threat (APT) groups against the nations of the Association of Southeast Asian Nations (ASEAN). Discover the tactics employed by infamous threat actors like Mustang Panda in their sophisticated digital attacks, leveraging malware, phishing emails, and zero-day vulnerabilities to infiltrate and spy on Southeast Asian countries. We unravel the complexities of these cyber operations, examining the implications for regional security and the global fight against digital crime. From brute force attacks to the subtle nuances of cyber warfare, join us as we shed light on the unseen battles shaping our digital landscape. Don't forget to subscribe, hit the bell icon, and like this video for more insightful content on cybersecurity threats and defenses. 🔔 Subscribe now for updates on the latest threats and how to protect yourself in the digital age. ### Sources * Hacker News Reporting on Chinese Apt Actors : https://thehackernews.com/2024/03/two-chinese-apt-groups-ramp-up-cyber.html * Unit 42 Report: https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/ * Original KeyScrambler: https://www.qfxsoftware.com/features/ * Pwn2Own rewards: https://www.securityweek.com/200000-awarded-at-pwn2own-2024-for-tesla-hack/ #CyberSecurity #CyberEspionage #APTGroups #DigitalWarfare #ChineseHackers #ASEAN #MustangPanda #CyberCrime #Hacking #Malware #Phishing #ZeroDay #CyberThreats #InformationSecurity #InfoSec #NetworkSecurity #DigitalDefense #CyberAttack #DataBreach #CyberIntelligence #InternetSafety #TechNews #CyberAware #OnlineSecurity #PrivacyProtection #CyberSafety #CyberWar #NationalSecurity #ThreatIntelligence #CyberSovereignty
…
continue reading
40 afleveringen
Alle afleveringen
×Welkom op Player FM!
Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.