POPULARITY
Referências do EpisódioCitrixBleed 2 situation update — everybody already got ownedContagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware LoaderRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioKongTuke FileFix Leads to New Interlock RAT VariantIntroducing FileFix – A New Alternative to ClickFix AttacksIntroducing FileFix – A New Alternative to ClickFix AttacksVídeo que fiz sobre ClickFixWing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the WildEvolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware TechniquesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódiomacOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius AppCVE-2025-48384: Git vulnerable to arbitrary file write on non-Windows systemsArbitrary code execution through broken config quotingCVE-2025-48384: Breaking Git with a carriage return and cloning RCECISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target EnterprisesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do Episódio2025-07 Security Bulletin: Junos OS and Junos OS Evolved: Vulnerability in the RADIUS protocol for Subscriber Management (Blast-RADIUS) (CVE-2024-3596)Blast-RADIUS2025-07 Security Bulletin: Juniper Security Director: Insufficient authorization for multiple endpoints in web interface (CVE-2025-52950)ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLsFrom Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government EntitiesIranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliatesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioJuly 2025 Security UpdatesCVE-2025-25257 - Unauthenticated SQL injection in GUIPublic exploits released for Citrix Bleed 2 NetScaler flaw, patch nowRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioBERT Ransomware Group Targets Asia and Europe on Multiple PlatformsBatavia spyware steals data from Russian organizationsGamers hacked playing Call of Duty: WWII—PC version temporarily taken offlineRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioExploiting Trust: How Signed Drivers Fuel Modern Kernel Level Attacks on WindowsExclusive disclosure of the attack activities of the APT group NightEagle.Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major DistrosLocal Privilege Escalation via host optionHow Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioNa madrugada, um PIX de R$ 18 milhões. Começava o assaltoBMP diz que suas contas reserva no BC foram acessadas em ataque hacker à C&M Software, outras 5 instituições foram afetadasPF investiga ataque a sistemas de instituições financeiras ligada ao BCComo o BC conseguiu reverter parte do Pix movimentada em ataque hacker de quase R$ 1 biCisco Unified Communications Manager Static SSH Credentials VulnerabilitymacOS NimDoor | DPRK Threat Actors Target Web3 and Crypto Platforms with Nim-Based MalwareWindows Shortcut (LNK) Malware StrategiesGamaredon in 2024: Cranking out spearphishing campaigns against Ukraine with an evolved toolsetPro-Russian hacktivism: Shifting alliances, new groups and risksSilent Push Uncovers Chinese Fake Marketplace e-Commerce Phishing Campaign Using Thousands of Websites to Spoof Popular Retail BrandsCrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across IndustriesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioStable Channel Update for Desktop (CVE-2025-6554)Update your Chrome to fix new actively exploited zero-day vulnerabilityDCRAT Impersonating the Colombian GovernmentIBM X-Force Threat Analysis: DCRat presence growing in Latin AmericaOkta observes v0 AI tool used to build phishing sitesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioJasper Sleet: North Korean remote IT workers' evolving tactics to infiltrate organizationsDOJ raids 29 ‘laptop farms' in crackdown on N. Korean IT worker schemeIdentities of More Than 80 Americans Stolen for North Korean IT Worker ScamsCrypto investment fraud ring dismantled in Spain after defrauding 5 000 victims worldwideEuropol Dismantles $540 Million Cryptocurrency Fraud Network, Arrests Five SuspectsCISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical EnvironmentIranian Cyber Actors May Target Vulnerable US Networks and Entities of InterestRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSecurity Advisory: Airoha-based Bluetooth Headphones and EarbudsTracing Blind Eagle to Proton66CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler ExploitationRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioBrother printer bug in 689 models exposes default admin passwordsAPT42 impersonates cyber professionals to phish Israeli academics and journalistsDeepSeek Deception: Sainbox RAT & Hidden Rootkit DeliveryCapCut Con: Apple Phishing & Card-Stealing Refund RuseRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioCitrixBleed 2: Electric Boogaloo — CVE-2025–5777NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-5349 and CVE-2025-5777NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543Citrix users hit by actively exploited zero-day vulnerabilityCisco Identity Services Engine Unauthenticated Remote Code Execution VulnerabilitiesIn the Wild: Malware Prototype with Embedded Prompt InjectionRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioIntroducing FileFix – A New Alternative to ClickFix AttacksIntroducing FileFix – A New Alternative to ClickFix AttacksVídeo que fiz sobre ClickFixThreat Actors Modify and Re-Create Commercial Software to Steal Users' InformationCyberAv3ngers: From Infrastructure Hacks to Propaganda Machines in the Iran-Israel Cyber WarCryptominers' Anatomy: Shutting Down Mining BotnetsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioEcho Chamber: A Context-Poisoning Jailbreak That Bypasses LLM GuardrailsDRAT V2: Updated DRAT Emerges in TAG-140's ArsenalCanada says Salt Typhoon hacked telecom firm via Cisco flawAnalyzing the Gonjeshke Darande attack on Iranian crypto exchange NobitexMiddle East Cyber Escalation: From Hacktivism to Sophisticated Threat OperationsSysdig Threat Bulletin: Iranian Cyber ThreatsNATO summit commences in tandem with tense cyber, kinetic conflictRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSparkKitty, SparkCat's little brother: A new Trojan spy found in the App Store and Google PlayResurgence of the Prometei BotnetAnondoor discloses — The latest componentized backdoor of the ConfuciusADS 之殇,Confucius 组织利用 ADS 隐藏载荷攻击宗教相关人士 (sobre o WooperStealer)Sobre o comprometimento das 16 bilhões de senhas Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do Episódio/bin/live - hackerspacesVulnerabilities Resolved in Veeam Backup & Replication 12.3.2Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience PlatformExploring a New KimJongRAT Stealer Variant and Its PowerShell ImplementationA Wretch Client: From ClickFix deception to information stealer deployment僵尸永远不死:RapperBot僵尸网络近况分析Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper BackdoorArtificial Eyes: Generative AI in China's Military IntelligenceRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06/bin/live - hackerspacesEurope-wide takedown hits longest-standing dark web drug marketCritical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix BotnetCVE-2025-3464 - Asus Armoury Crate AsIO3.sys authorization bypass vulnerabilityHackers switch to targeting U.S. insurance companiesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06/bin/live - hackerspacesAnubis: A Closer Look at an Emerging Ransomware with Built-in WiperGrayAlpha Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RATFog Ransomware: Unusual Toolset Used in Recent AttackFileless AsyncRAT Distributed Via Clickfix Technique Targeting German Speaking UsersWarning Against Distribution of Malware Disguised as Research Papers (Kimsuky Group)Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06Graphite Caught: First Forensic Confirmation of Paragon's iOS Mercenary Spyware Finds Journalists TargetedAbout the security content of iOS 15.8.4 and iPadOS 15.8.4Predator Still Active, with New Client and Corporate Links IdentifiedTrend Micro fixes critical bugs in Apex Central and TMEE PolicyServerRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioZero-click AI data leak flaw uncovered in Microsoft 365 Copilot20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdownServidores expostos com a CVE-2025-49113SmartAttack: Air-Gap Attack via SmartwatchesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06Microsoft June 2025 Patch Tuesday fixes exploited zero-day, 66 flawsCVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage Stealth FalconSAP Security Patch Day - June 2025Security Advisory Ivanti Workspace Control (CVE-2025-5353, CVE- CVE-2025-22463, CVE-2025-22455)CVE-2025-31104 no FortiADCAdobe Releases Patch Fixing 254 Vulnerabilities, Closing High-Severity Security GapsA vulnerability in Insyde H2O UEFI application allows for digital certificate injection via NVRAM variableINSYDE-SA-2025002 - CVE-2025-4275Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier TargetsAn Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and ObscuredWhat 7,000+ NodeZero RAT Attempts Show Us About Cyber SecurityRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06SOC Tempest com Google SecOpsCritical Fortinet flaws now exploited in Qilin ransomware attacksAnalysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions GloballyBlitz Malware: A Tale of Game Cheats and Code RepositoriesBadBox 2.0 botnet infects millions of IoT devices worldwide, FBI warnsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioTuring Day 2025 – 5º edição - 17/06SMM Callout Vulnerabilities in UEFIPower Automate Elevation of Privilege Vulnerability (CVE-2025-47966)BladedFeline: Whispering in the darkDuplexSpy RAT: Stealthy Windows Malware Enabling Full Remote Control and SurveillanceHacker selling critical Roundcube webmail exploit as tech info disclosedRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioCisco Identity Services Engine on Cloud Platforms Static Credential VulnerabilityHello, Operator? A Technical Analysis of Vishing ThreatsThe strange tale of ischhfd83: When cybercriminals eat their ownFrom open-source to open threat: Tracking Chaos RAT's evolutionRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioCrocodilus Mobile Malware: Evolving Fast, Going GlobalRoundcube ≤ 1.6.10 Post-Auth RCE via PHP Object DeserializationProva de conceito da Positive Technologies How Threat Actors Exploit Human Trust: A Breakdown of the 'Prove You Are Human' Malware SchemeRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioStable Channel Update for DesktopNew Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band PatchQualcomm June 2025 Security BulletinQualcomm fixed three zero-days exploited in limited, targeted attacksDevOps Tools Targeted for CryptojackingRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSOC Tempest com Google SecOpsTreasury Takes Action Against Major Cyber Scam FacilitatorChasing Eddies: New Rust- based InfoStealer used in CAPTCHA campaignsHackers are exploiting critical flaw in vBulletin forum softwareRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioCybercriminals camouflaging threats as AI tool installersQualys TRU Discovers Two Local Information Disclosure Vulnerabilities in Apport and systemd-coredump: CVE-2025-5054 and CVE-2025-4598ConnectWise breached in cyberattack linked to nation-state hackersCisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) AnalysisMeta Disrupts Influence Ops Targeting Romania, Azerbaijan, and Taiwan with Fake PersonasRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioMark Your Calendar: APT41 Innovative TacticsPumaBot: Novel Botnet Targeting IoT Surveillance DevicesZanubis in motion: Tracing the active evolution of the Android banking malwareGreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS RoutersPakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional ConflictOneDrive File Picker Flaw Provides ChatGPT and Other Web Apps Full Read Access to Users' Entire OneDriveInside a VenomRAT Malware CampaignPureHVNC RAT Using Fake High-level Job Offers from Fashion and Beauty BrandsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioEarth Lamia Develops Custom Arsenal to Target Multiple IndustriesDragonForce actors target SimpleHelp vulnerabilities to attack MSP, customersNew Russia-affiliated actor Void Blizzard targets critical sectors for espionageOnbekende Russische groep achter hacks Nederlandse doelenRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioThe Sharp Taste of Mimo'lette: Analyzing Mimo's Latest Campaign targeting Craft CMSUsage statistics and market share of Craft CMSHow Craft CMS built Craft CloudInvestigating an in-the-wild campaign using RCE in CraftCMSRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSilent Ransom Group Targeting Law FirmsScarcity signals: Are rare activities red flags?APT그룹추적보고서 TA-ShadowCricketNSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 CampaignRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioDanabot: Analyzing a fallen empireViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse. Inside DanaBot's Infrastructure: In Support of Operation Endgame II Operation Endgame 2.0: DanaBustedПодробный технический анализ инструментария Obstinate Mogwai. Часть 2: бэкдоры Donnect, DimanoRAT и веб-шелл AntSpyUAT-6382 exploits Cityworks zero-day vulnerability to deliver malwareRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioBadSuccessor: Abusing dMSA to Escalate Privileges in Active DirectoryEuropol and Microsoft disrupt world's largest infostealer LummaLumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealerLumma Stealer toppled by globally coordinated takedown Russian GRU Targeting Western Logistics Entities and Technology CompaniesDero miner zombies biting through Docker APIs to build a cryptojacking hordeRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioIvanti EPMM RCE Vulnerability Chain Exploited in the WildCloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam ActorBrand impersonation, online ads, and malicious merchants help purchase scam network prey on victimsHidden Threats of Dual-Function Malware Found in Chrome ExtensionsThe Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation WebsiteDuping Cloud Functions: An emerging serverless attack vectorRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioFirefox Security Response to pwn2own 2025Hackers earn $1,078,750 for 28 zero-days at Pwn2Own BerlinHow Interlock attacks IT specialists with fake CAPTCHAs and ClickFixClickFixの被害をJSOCの複数のお客様にて観測Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioChinese ‘kill switches' found hidden in US solar farmsAnother Confluence Bites the Dust: Falling to ELPACO-team RansomwareRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioAlert Number: I-051525-PSA - May 15, 2025 - Senior US Officials Impersonated in Malicious Messaging CampaignOperation RoundPressSophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RATRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioDarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoItStable Channel Update for DesktopExcel(ent) Obfuscation: Regex Gone RogueReliaQuest Uncovers New Critical Vulnerability in SAP NetWeaverRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioMicrosoft May 2025 Patch Tuesday fixes 5 exploited zero-days, 72 flawsStack-based buffer overflow vulnerability in APISecurity Advisory Ivanti Neurons for ITSM (On-Premises Only) (CVE-2025-22462)Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428)SAP Security Patch Day - May 2025/bin/live: Gabriela SallesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioEarth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in TaiwanMarbled Dust leverages zero-day in Output Messenger for regional espionageResearchers found one-click RCE in ASUS's pre-installed software DriverHubModern Incident Response: Tackling Malicious ML Artifacts/bin/live - programa da Mente Binária que ocorre hoje às 20hsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioStealthy .NET Malware: Hiding Malicious Payloads as Bitmap ResourcesBreaking the Sound Barrier Part I: Fuzzing CoreAudio with Mach MessagesClassic Rock: Hunting a Botnet that preys on the OldLumma Stealer, coming and goingVídeo que fiz sobre ClickFixRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSpam campaign targeting Brazil abuses Remote Monitoring and Management toolsAscensão do uso de softwares de monitoramento e gerenciamento remoto em campanhas maliciosasSonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as RootMultiple vulnerabilities in SonicWall SMA 100 series (FIXED)The LockBit ransomware site was breached, database dump was leaked onlineThreat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat ActorRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioCVE-2025-20188 - Cisco IOS XE Wireless Controller Software Arbitrary File Upload VulnerabilityRansomware Attackers Leveraged Privilege Escalation Zero-dayAgenda Ransomware Group Adds SmokeLoader and NETXLOADER to Their ArsenalCOLDRIVER Using New Malware To Steal Documents From Western Targets and NGOsVídeo que fiz sobre ClickFixInferno Drainer Reloaded: Deep Dive into the Return of the Most Sophisticated Crypto DrainerNew Finance Scam Discovered Abusing Niche X/Twitter Advertising LoopholeNew DOGE Big Balls Ransomware Tools in the WildIranian Cyber Actors Impersonate Model Agency in Suspected Espionage OperationSysOwned, Your Friendly Support Ticket - SysAid On-Premise Pre-Auth RCE Chain (CVE-2025-2775 And Friends)Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSamsung MagicINFO 9 Server RCE flaw now exploited in attacks Samsung SVP-AUG-2024 Canary Exploit tool for CVE-2025-30065 Apache Parquet Avro VulnerabilitySmishing on a Massive Scale: "Panda Shop" Chinese Carding SyndicateLights Out and Stalled Factories: Using MATRIX to Learn About Modbus VulnerabilitiesBit ByBit - emulation of the DPRK's largest cryptocurrency heistRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioBring Your Own Installer: Bypassing SentinelOne Through Agent Version Change InterruptionBoletim de segurança do Android: maio de 2025Google addresses 1 actively exploited vulnerability in May's Android security updateCVE-2025-27363Defending Against UNC3944: Cybercrime Hardening Guidance from the FrontlinesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioSOC Tempest com Google SecOpsI StealC You: Tracking the Rapid Changes To StealCwget to Wipeout: Malicious Go Modules Fetch Destructive PayloadBackdoor found in popular ecommerce componentsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
In “Got (Raw) Milk? The Small Family Dairy Farms Behind a Big Controversy,” Gravy producer Bianca Garcia takes listeners to Milky Way Farm, the last dairy in Anderson County, South Carolina, where raw milk sales are keeping the Peeler family afloat. Their neighbors have succumbed to the pressures that have defined a generation of farmers. Between 2003 and 2022, South Carolina—where the state beverage is a glass of cold milk—lost 75 percent of licensed dairy operations. They have found their market in a niche constituency, though the wider public might disapprove. Raw milk is a risky product, often considered a public health risk. Raw milk is unpasteurized, meaning it hasn't been through a sanitizing kill step. Scientists worry that it can make consumers vulnerable to bacterial or viral infection, but raw milk lovers can't get enough of the creamy taste and allegedly healthful properties. This debate is situated in what seems to be a public health emergency. Reports of bird flu infecting dairy cattle leave public health officials worried that drinking raw milk can spread disease. Under the Trump presidency, Secretary of the Department of Health and Human Services Robert F. Kennedy Jr. has vowed to increase public access to raw milk as a part of his Make America Healthy Again agenda. Raw influencers and “tradwives” promote it endlessly on social media. Through all this noise, it's easy to lose sense of the fact that this is an issue that starts on the farm. In this episode, you will hear from L.D. Peeler, acting patriarch of Milky Way Farm, his daughter, Iris, and son, Davis. Each plays a role on their small family farm, which raises 120 Jersey cows: Davis works on the farm, L.D. manages the finances, and Iris does the public relations. They each have different, but entangled, stories to tell. At Milky Way Farm, we are reminded that, just like any other food, raw milk starts with the land, the animals, and the people that make it possible. Guided by the community's desire for a tasty and safe product, the Peelers have shaped their business to meet this need. Thus, in the face of economic pressures of the dairy industry and cultural pressures around the product, they have risen above—like the cream beneath the lid of their bottled pints. Learn more about your ad choices. Visit megaphone.fm/adchoices