POPULARITY
Referências do Episódio/bin/live: Rafael Silva, Luiz Eduardo, Willian Caprino e Nelson Murilo - HackingRemote Code Execution via Expression InjectionCritical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of InstancesDecember 22 Advisory: Critical n8n Vulnerability Allows Remote Code Execution [CVE-2025-68613]From ClickFix to code signed: the quiet shift of MacSync Stealer malwareFrom cheats to exploits: Webrat spreading via GitHubEntrarei de férias. Volto no dia 19 de janeiro.Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioNPM Package With 56K Downloads Caught Stealing WhatsApp Messages작전명 아르테미스: HWP 기반 DLL 사이드 로딩 공격 분석Zscaler Threat Hunting Catches Evasive SideWinder APT CampaignTracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioHPESBGN04985 rev.2 - Hewlett Packard Enterprise OneView Software, Remote Code ExecutionCVE-2025-37164: Critical unauthenticated RCE affecting Hewlett Packard Enterprise OneViewAcronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaignsLongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and JapanRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioSonicWall SMA1000 appliance local privilege escalation vulnerabilityCVE-2025-40602: SonicWall Secure Mobile Access (SMA) 1000 Zero-Day ExploitedSonicWall warns of actively exploited flaw in SMA 100 AMCUAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web ManagerCISA Adds Three Known Exploited Vulnerabilities to CatalogOperation ForumTroll continues: Russian political scientists targeted using plagiarism reportsGachiLoader: Defeating Node.js Malware with API TracingRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio史上最疯:独家揭秘感染全球180万Android设备的巨型僵尸网络KimwolfInside Ink Dragon: Revealing the Relay Network and Inner Workings of a Stealthy Offensive OperationEtherRAT dissected: How a React2Shell implant delivers 5 payloads through blockchain C2Inside GhostPoster: How a PNG Icon Infected 50,000 Firefox UsersRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground ForumsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026Apple Issues Security Updates After Two WebKit Flaws Found Exploited in the WildMultiple Threat Actors Exploit React2Shell (CVE-2025-55182)Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioHunting for Mythic in network trafficHamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware SuiteSHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like TacticsGogs 0-Day Exploited in the WildHow to find Gogs installations on your network - Latest Gogs vulnerability: CVE-2025-8110CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The WildConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grantsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio *Stable Channel Update for Desktop - Wednesday, December 10, 2025 - https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html *Google fixes eighth Chrome zero-day exploited in attacks in 2025 - https://www.bleepingcomputer.com/news/security/google-fixes-eighth-chrome-zero-day-exploited-in-attacks-in-2025/ SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies And WSDL - https://labs.watchtowr.com/soapwn-pwning-net-framework-applications-through-http-client-proxies-and-wsdl/ NANOREMOTE, cousin of FINALDRAFT - https://www.elastic.co/security-labs/nanoremote Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits - https://research.checkpoint.com/2025/cracking-valleyrat-from-builder-secrets-to-kernel-rootkits/ Thousands of Exposed Secrets Found on Docker Hub, Putting Organizations at Risk - http://flare.io/learn/resources/docker-hub-secrets-exposed/ Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referencias do episodioWebinar Tendencias em Cyber 2026https://www.even3.com.br/tendencias-em-cyber-2026-661705/Microsoft December 2025 Patch Tuesday fixes 3 zero-days, 57 flawshttps://www.bleepingcomputer.com/news/microsoft/microsoft-december-2025-patch-tuesday-fixes-3-zero-days-57-flaws/Microsofts December 2025 Patch Tuesday Addresses 56 CVEs (CVE-2025-62221)https://www.tenable.com/blog/microsofts-december-2025-patch-tuesday-addresses-56-cves-cve-2025-62221Microsoft and Adobe Patch Tuesday, December 2025 – Security Update Reviewhttps://blog.qualys.com/vulnerabilities-threat-research/2025/12/09/microsoft-patch-tuesday-december-2025-security-update-reviewFortinet warns of critical FortiCloud SSO login auth bypass flawshttps://www.bleepingcomputer.com/news/security/fortinet-warns-of-critical-forticloud-sso-login-auth-bypass-flaws/Multiple Fortinet Products FortiCloud SSO Login Authentication Bypasshttps://www.fortiguard.com/psirt/FG-IR-25-647Security Advisory EPM December 2025 for EPM 2024https://forums.ivanti.com/s/article/Security-Advisory-EPM-December-2025-for-EPM-2024CVE-2025-10573: Ivanti EPM Unauthenticated Stored Cross-Site Scripting (Fixed)https://www.rapid7.com/blog/post/cve-2025-10573-ivanti-epm-unauthenticated-stored-cross-site-scripting-fixed/PeerBlight Linux Backdoor Exploits React2Shell CVE-2025-55182https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shellEtherRAT: DPRK uses novel Ethereum implant in React2Shell attackshttps://www.sysdig.com/blog/etherrat-dprk-uses-novel-ethereum-implant-in-react2shell-attacksChina-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/CVE-2025-55182: React2Shell Critical Vulnerability — what it is and what to dohttps://www.dynatrace.com/news/blog/cve-2025-55182-react2shell-critical-vulnerability-what-it-is-and-what-to-do/Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026The VS Code Malware That Captures Your Screen | Koi BlogGrayBravo's CastleLoader Activity Clusters Target Multiple IndustriesRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026AI-Automated Threat Hunting Brings GhostPenguin Out of the ShadowsMaximum-severity XXE vulnerability discovered in Apache TikaChina-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)CVE-2025-55182 (React2Shell) Opportunistic Exploitation In The Wild: What The GreyNoise Observation Grid Is Seeing So FarCritical React2Shell Flaw Added to CISA KEV After Confirmed Active ExploitationInside Shanya, a packer-as-a-service fueling modern attacksRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioCritical Security Vulnerability in React Server ComponentsReact2Shell (CVE-2025-55182) - Critical unauthenticated RCE affecting React Server ComponentsCVE-2025-55182: Frequently Asked Questions About React2Shell: React Server Components Remote Code Execution VulnerabilityBRICKSTORM BackdoorActive Exploitation of 7-Zip RCE Vulnerability Shows Why Manual Patching is No Longer an OptionArray Networks Array AGシリーズにおけるコマンドインジェクションの脆弱性に関する注意喚起 Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026Sanctioned but Still Spying: Intellexa's Prolific Zero-Day Exploits ContinueIntellexa's Global Corporate WebFrench NGO Reporters Without Borders targeted by Calisto in recent campaignMalicious Rust Crate evm-units Serves Cross-Platform Payloads for Silent ExecutionRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWebinar Tendências em Cyber 2026New eBPF Filters for Symbiote and BPFdoor MalwareTechnical Analysis of Matanbuchus 3.0Hook for Gold: Inside GoldFactory's Сampaign That Turns Apps Into GoldminesValleyRAT Campaign Targets Job Seekers, Abuses Foxit PDF Reader for DLL Side-loadingMuddyWater: Snakes by the riverbankRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioImperioShell e PolyjuiceCookie: Backdoor e cookie stealer miram empresas no BrasilUnraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsAppDo Coyote ao Astaroth: o abuso do WhatsApp se consolida como método de infecção do cibercrime brasileiroVídeo sobre os recentes ataques via WhatsApp Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign | Koi BlogGoogle Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the WildRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioTwo Years, 17K Downloads: The NPM Malware That Tried to Gaslight Security ScannersCISA Adds One Known Exploited Vulnerability to Catalog[REPORT] Falhas de segurança em versões do ScadaBRAPT36 Python Based ELF Malware Targeting Indian Government EntitiesThor vs. Silver Fox – Uncovering and Defeating a Sophisticated ValleyRat CampaignRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioDragons in Thunder3 OAuth TTPs Seen This Month — and How to Detect Them with Entra ID LogsOpenAI data may have been exposed after a cyberattack on analytics firm MixpanelRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioShadowV2 Casts a Shadow Over IoT Devices | FortiGuard LabStop Putting Your Passwords Into Random Websites (Yes, Seriously, You Are The Problem)ASUS warns of new critical auth bypass flaw in AiCloud routersCVE-2025-59366Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioZscaler Threat Hunting Discovers and Reconstructs a Sophisticated Water Gamayun APT Group AttackFlexibleFerret malware continues to strikeRussian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting UkraineRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioShai Hulud Launches Second Supply-Chain Attack: Zapier, ENS, AsyncAPI, PostHog, Postman CompromisedMorphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend FilesRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioSpiderLabs IDs New Banking Trojan Distributed Through WhatsApp WhatsApp compromise leads to Astaroth deploymentVídeo que fiz sobre o ataque no WhatsAppBeyond the Watering Hole: APT24's Pivot to Multi-Vector AttacksBlockchain and Node.js abused by Tsundere: an emerging botnetPlushDaemon compromises network devices for adversary-in-the-middle attacksАтаки разящей панды: APT31 сегодняSturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal EncryptionCISA warns Oracle Identity Manager RCE flaw is being actively exploitedRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioCVE-2025-58034 - Multiple OS command injection in API and CLICloudflare outage on November 18, 2025A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone NumbersRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio/bin/live a live da Mente Binária sobre a Red Team CommunityStable Channel Update for Desktop (CVE-2025-13223 e CVE-2025-13224)Defending the cloud: Azure neutralized a record-breaking 15 Tbps DDoS attackFrontline Intelligence: Analysis of UNC1549 TTPs, Custom Tools, and Malware Targeting the Aerospace and Defense EcosystemRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioContagious Interview Actors Now Utilize JSON Storage Services for Malware DeliveryXWiki Under Increased AttackCVE-2025-64446 - Path confusion vulnerability in GUIRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioTweet da Defused sobre a falha no FortiWebPostagem da Pwndefend sobre a falha no FortiWebTweet da WachTowr sobre a falha no FortiWebCritical Vulnerability in Fortinet FortiWeb Exploited in the WildRONINGLOADER: DragonBreath's New Path to PPL AbuseIncrease in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting TacticsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioMicrosoft November 2025 Security UpdatesSAP Security Patch Day - November 2025Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioState-Sponsored Remote Wipe Tactics Targeting Android DevicesNo Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioLANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung DevicesWhisper Leak: A novel side-channel attack on remote language modelsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioCisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall Threat Defense Software VPN Web Server Remote Code Execution VulnerabilityThe most advanced ClickFix yet?Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioGTIG AI Threat Tracker: Advances in Threat Actor Usage of AI ToolsCisco Unified Contact Center Express Remote Code Execution Vulnerabilities (CVE-2025-20354 e CVE-2025-20358)Sharing is scaring: The WhatsApp screen-sharing scam you didn't see comingRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioScattered LAPSUS$ Hunters: Anatomy of a Federated Cybercriminal BrandExploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities ExposedAndroid Security Bulletin—November 2025Apple addresses more than 100 vulnerabilities in security updates for iPhones, Macs and iPadsGoogle Big Sleep found five vulnerabilities in SafariRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioSesameOp: Novel backdoor uses OpenAI Assistants API for command and controlRemote access, real cargo: cybercriminals targeting trucking and logisticsNota de pesar: Rubens Kühl, gerente de produtos e mercado do Registro.brRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioDon't take BADCANDY from strangers – How your devices could be implanted and what to do about itWhen AI Agents Go Rogue: Agent Session Smuggling Attack in A2A SystemsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioCISA orders feds to patch VMware Tools flaw exploited by Chinese hackersCISA Adds Two Known Exploited Vulnerabilities to CatalogYou name it, VMware elevates it (CVE-2025-41244)VMSA-2025-0015: VMware Aria Operations and VMware Tools updates address multiple vulnerabilities (CVE-2025-41244,CVE-2025-41245, CVE-2025-41246)Silent Push Unearths AdaptixC2's Ties to Russian Criminal Underworld, Tracks Threat Actors Harnessing Open-Source Tool for Malicious PayloadsPF deflagra segunda fase de operação contra organização criminosa especializada em fraudes bancárias digitaisRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioPhantomRaven: NPM Malware Hidden in Invisible DependenciesFrom Scripts to Systems: A Comprehensive Look at Tangerine Turkey OperationsSuspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain AttackRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioNew Android Malware Herodotus Mimics Human Behaviour to Evade DetectionFrom Brazil with Love: New Tactics from Lampion锁定ORB网络PolarEdge的关键拼图: RPX中继系统浮出水面An Introduction to Operational Relay Box (ORB) Networks - Unpatched, Forgotten, and ObscuredRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioMem3nt0 mori – The Hacking Team is back!Stable Channel Update for Desktop - Tuesday, March 25, 2025Crypto wasted: BlueNoroff's ghost mirage of funding and jobsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioActive Water Saci Campaign in WhatsApp Features Multi-Vector Persistence and Sophisticated C&CUncovering Qilin attack methods exposed through multiple casesOpenAI Atlas Omnibox Prompt Injection: URLs That Become JailbreaksCISA Adds Two Known Exploited Vulnerabilities to Catalog Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioWindows Server Update Service (WSUS) Remote Code Execution Vulnerability (CVE-2025-59287)Agenda Ransomware Deploys Linux Variant on Windows Systems Through Remote Management Tools and BYOVD TechniquesThe Smishing Deluge: China-Based Campaign Flooding Global Text MessagesDissecting YouTube's Malware Distribution NetworkRedTiger: New Red Teaming Tool in the Wild Targeting Gamers and Discord AccountsHelp Wanted: Vietnamese Actors Using Fake Job Posting Campaigns to Deliver Malware and Steal CredentialsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioBrazilian Caminho Loader Employs LSB Steganography and Fileless Execution to Deliver Multiple Malware Families Across South America, Africa, and Eastern EuropePhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing OperationGotta fly: Lazarus targets the UAV sectorTransparentTribe targets Indian military organisations with DeskRATJingle Thief: Inside a Cloud-Based Gift Card Fraud CampaignToolShell Used to Compromise Telecoms Company in Middle EastSessionReaper attacks have started, 3 in 5 stores still vulnerableRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio/bin/live: Juliana D'Addio e Gustavo Marques - Conscientização e Cultura de segurançaThe Rise of Collaborative Tactics Among China-aligned Cyber Espionage CampaignsUnmasking MuddyWater's New Malware Toolkit Driving International EspionageLOLRMMTOLLBOOTH: What's yours, IIS mineOracle October 2025 Critical Patch Update Addresses 170 CVEsTP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code ExecutionTARmageddon (CVE-2025-62518): RCE Vulnerability Highlights the Challenges of Open Source AbandonwareRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio/bin/live: Juliana D'Addio e Gustavo Marques - Conscientização e Cultura de segurançaTo Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVERFast, Broad, and Elusive: How Vidar Stealer 2.0 Upgrades Infostealer CapabilitiesInside the attack chain: Threat activity targeting Azure Blob StorageCISA Adds Five Known Exploited Vulnerabilities to CatalogRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do EpisódioPost-exploitation framework now also delivered via npmTracking Malware and Attack Expansion: A Hacker Group's Journey across AsiaRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio[Mesa na REC'n'Play 2025] Cibersegurança: um grande desafio na saúde?Potentially ‘Catastrophic' Breach of Cyber Firm Blamed on ChinaK000156572: Quarterly Security Notification (October 2025)Inside the F5 Breach: What We Know and Recommended ActionsAnother BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal SectorsBRICKSTORM Indicator of Compromise ScannerDPRK Adopts EtherHiding: Nation-State Malware Hiding on BlockchainsRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio[Mesa na REC'n'Play 2025] Cibersegurança: um grande desafio na saúde?K000154696: F5 Security IncidentMaverick: a new banking Trojan abusing WhatsApp in a mass-scale distributionOperation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy RootkitsCVE-2025-20352 - Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution VulnerabilityDismantling a Critical Supply Chain Risk in VSCode Extension MarketplacesRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio[Mesa na REC'n'Play 2025] Cibersegurança: um grande desafio na saúde?Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flawsSecurity Advisory Ivanti Endpoint Manager (EPM) October 2025Roteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio[Mesa na REC'n'Play 2025] Cibersegurança: um grande desafio na saúde?New Oracle E-Business Suite Bug Could Let Hackers Access Data Without LoginClevo UEFI firmware embedded BootGuard keys compromising Clevo's implementation of BootGuardRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Referências do Episódio[Mesa na REC'n'Play 2025] Cibersegurança: um grande desafio na saúde?Huntress Threat Advisory: Widespread SonicWall SSLVPN CompromiseMySonicWall Cloud Backup File IncidentAstaroth: Banking Trojan Abusing GitHub for ResilienceRoteiro e apresentação: Carlos CabralEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
In “Got (Raw) Milk? The Small Family Dairy Farms Behind a Big Controversy,” Gravy producer Bianca Garcia takes listeners to Milky Way Farm, the last dairy in Anderson County, South Carolina, where raw milk sales are keeping the Peeler family afloat. Their neighbors have succumbed to the pressures that have defined a generation of farmers. Between 2003 and 2022, South Carolina—where the state beverage is a glass of cold milk—lost 75 percent of licensed dairy operations. They have found their market in a niche constituency, though the wider public might disapprove. Raw milk is a risky product, often considered a public health risk. Raw milk is unpasteurized, meaning it hasn't been through a sanitizing kill step. Scientists worry that it can make consumers vulnerable to bacterial or viral infection, but raw milk lovers can't get enough of the creamy taste and allegedly healthful properties. This debate is situated in what seems to be a public health emergency. Reports of bird flu infecting dairy cattle leave public health officials worried that drinking raw milk can spread disease. Under the Trump presidency, Secretary of the Department of Health and Human Services Robert F. Kennedy Jr. has vowed to increase public access to raw milk as a part of his Make America Healthy Again agenda. Raw influencers and “tradwives” promote it endlessly on social media. Through all this noise, it's easy to lose sense of the fact that this is an issue that starts on the farm. In this episode, you will hear from L.D. Peeler, acting patriarch of Milky Way Farm, his daughter, Iris, and son, Davis. Each plays a role on their small family farm, which raises 120 Jersey cows: Davis works on the farm, L.D. manages the finances, and Iris does the public relations. They each have different, but entangled, stories to tell. At Milky Way Farm, we are reminded that, just like any other food, raw milk starts with the land, the animals, and the people that make it possible. Guided by the community's desire for a tasty and safe product, the Peelers have shaped their business to meet this need. Thus, in the face of economic pressures of the dairy industry and cultural pressures around the product, they have risen above—like the cream beneath the lid of their bottled pints. Learn more about your ad choices. Visit megaphone.fm/adchoices