[Referências do Episódio]
- Iran-linked APT groups started exploiting Papercut flaw - https://securityaffairs.com/145952/apt/iranian-apt-papercut-exploitation.html
- AndoryuBot – New Botnet Campaign Targets Ruckus Wireless Admin Remote Code Execution Vulnerability (CVE-2023-25717) - https://www.fortinet.com/blog/threat-research/andoryubot-new-botnet-campaign-targets-ruckus-wireless-admin-remote-code-execution-vulnerability-cve-2023-25717
- AhnLab EDR Tracks and Responds against Link File (*.lnk) Distributing RokRAT - https://asec.ahnlab.com/en/52172/
- Woman who scanned QR code with malware lost $20k to bubble tea survey scam while she was sleeping - https://www.straitstimes.com/singapore/woman-who-scanned-qr-code-with-malware-lost-20k-to-bubble-tea-survey-scam-while-she-was-sleeping
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto