by Tempest Security Intelligence
Podcast de cibersegurança produzido pela Tempest com episódios diários, publicados logo pela manhã com aquilo que foi mais relevante nas últimas vinte e quatro horas em termos de novos ataques, vulnerabilidade ou ameaças. Tudo em menos de dez minutos e traduzido para uma linguagem fácil, produzido para que você possa ajustar o curso do seu dia de modo a tomar as melhores decisões de cibersegurança para sua empresa.
Language
🇵🇹
Publishing Since
1/17/2022
Email Addresses
1 available
Phone Numbers
0 available
April 17, 2025
<p>Referências do Episódio</p><ul><li><p><a href="https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/"><u>CVE-2025-24054</u></a>, NTLM exploit in the wild</p></li><li><p><a href="https://support.apple.com/en-us/122402"><u>About</u></a> <a href="https://support.apple.com/en-us/122400"><u>Apple</u></a> <a href="https://support.apple.com/en-us/122401"><u>Security</u></a> <a href="https://support.apple.com/en-us/122282"><u>Updates</u></a></p></li><li><p><a href="https://www.cisa.gov/news-events/alerts/2025/04/16/cisa-adds-one-known-exploited-vulnerability-catalog"><u>CISA</u></a> adds One Known Exploited Vulnerability to Catalog</p></li></ul><p>Roteiro e apresentação: Carlos Cabral e Bianca Oliveira</p><p>Edição de áudio: Paulo Arruzzo</p><p>Narração de encerramento: Bianca Garcia</p>
April 16, 2025
<p><strong>Referências do Episódio</strong></p><ul><li><p><a href="https://research.checkpoint.com/2025/apt29-phishing-campaign/"><u>Renewed APT29 Phishing Campaign</u></a> Against European Diplomats</p></li><li><p>UNC5174’s evolution in China’s ongoing cyber warfare: <a href="https://sysdig.com/blog/unc5174-chinese-threat-actor-vshell/"><u>From SNOWLIGHT to VShell</u></a></p></li><li><p><a href="https://www.trendmicro.com/en_us/research/25/d/crazyhunter-campaign.html"><u>CrazyHunter Campaign</u></a> Targets Taiwanese Critical Sectors</p></li><li><p>Threat actors <a href="https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads/"><u>misuse Node.js</u></a> to deliver malware and other malicious payloads</p></li><li><p>The <a href="https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding"><u>CVE program</u></a> for tracking security flaws is about to lose federal funding</p></li></ul><p>Roteiro e apresentação: Carlos Cabral e Bianca Oliveira</p><p>Edição de áudio: Paulo Arruzzo</p><p>Narração de encerramento: Bianca Garcia</p>
April 15, 2025
<p><strong>Referências do Episódio</strong></p><ul><li><p><a href="https://www.trendmicro.com/en_us/research/25/d/bpfdoor-hidden-controller.html"><u>BPFDoor’s Hidden Controller</u></a> Used Against Asia, Middle East Targets</p></li><li><p><a href="https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/cyber-year-in-retrospect/yir-cyber-threats-report-download.pdf"><u>Cyber Threats 2021</u></a>:A Year in Retrospect</p></li><li><p><a href="https://malpedia.caad.fkie.fraunhofer.de/actor/red_menshen"><u>Red Menshen</u></a> (a.k.a. Earth Bluecrow)</p></li><li><p>CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability <a href="https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild"><u>Exploited In The Wild</u></a></p></li><li><p><a href="https://research.checkpoint.com/2025/waiting-thread-hijacking/"><u>Waiting Thread Hijacking</u></a>: A Stealthier Version of Thread Execution Hijacking</p></li><li><p>New Malware Variant Identified: <a href="https://www.morphisec.com/blog/new-malware-variant-identified-resolverrat-enters-the-maze/"><u>ResolverRAT</u></a> Enters the Maze</p></li></ul><p>Roteiro e apresentação: Carlos Cabral e Bianca Oliveira</p><p>Edição de áudio: Paulo Arruzzo</p><p>Narração de encerramento: Bianca Garcia</p>
RedBelt Security
Loop Infinito
MacMagazine.com.br
Joyce Meyer
waffle 🧇
Luciano Pires & Café Brasil Editorial Ltda
Brasil Paralelo
InfoMoney
Leitura ObrigaHISTÓRIA
G1
Déia Freitas
Padre Paulo Ricardo
Central 3 Podcasts
Guilherme Goulart e Vinícius Serafim
Data Hackers
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.