Listen

Description

[Referências do Episódio]

- CVE-2023-28252 - 

  Windows Common Log File System Driver Elevation of Privilege Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28252

- CVE-2023-28285 - 

  Microsoft Office Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28285

- CVE-2023-28295 - 

  Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295

- CVE-2023-28287 - 

  Microsoft Publisher Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287

- CVE-2023-28311 - 

  Microsoft Word Remote Code Execution Vulnerability - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28311

- SAP Security Patch Day - April 2023 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html

- Schneider Electric - Cybersecurity Support Portal - https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp

- Siemens Security Advisories - https://new.siemens.com/global/en/products/services/cert.html#SecurityPublications

- Malware Disguised as Document from Ukraine's Energoatom Delivers Havoc Demon Backdoor - https://www.fortinet.com/blog/threat-research/malware-disguised-as-document-ukraine-energoatom-delivers-havoc-demon-backdoor

- Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers - https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/

- Exchange Server 2013 - https://learn.microsoft.com/en-us/lifecycle/products/exchange-server-2013urity Patch Day–April2023

[Ficha técnica]

Apresentação: Carlos Cabral

Roteiro: Carlos Cabral e Daniel Venzi

Edição de áudio: Paulo Arruzzo

Narração de encerramento: Bianca Garcia

Projeto gráfico: Julian Prieto