Listen

Description

[Referências do Episódio]

- Instagram Phishing Campaign: Hackers Exploit Social Verification - https://www.vadesecure.com/en/blog/instagram-phishing-campaign-hackers-exploit-social-verification

- Securing the Software Supply Chain: Recommended Practices for Developers - https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3146465/nsa-cisa-odni-release-software-supply-chain-guidance-for-developers/

- Tweet de Felipe Payão sobre o contato com o Everest - https://twitter.com/felipepayao/status/1565421522411462665?s=20&t=xAoLTSbhf66rCrEzxbvKrQ

- SETTLERS OF NETLINK: Exploiting a limited UAF in nf_tables (CVE-2022-32250) - https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/

- PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks - https://www.sentinelone.com/labs/pypi-phishing-campaign-juiceledger-threat-actor-pivots-from-fake-apps-to-supply-chain-attacks/

[Ficha técnica]

Apresentação: Carlos Cabral

Roteiro: Carlos Cabral e Daniel Venzi

Edição de áudio: Paulo Arruzzo

Narração de encerramento: Bianca Garcia

Projeto gráfico: Julian Prieto