Listen

Description

[Referências do Episódio]

- Tempest Vuln Watchlist - https://www.tempest.com.br/gerenciamento/threat-intelligence/vuln-watchlist/#contact

- SUPPLY CHAIN RISK FROM GIGABYTE APP CENTER BACKDOOR - https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/

- Dark Pink. Episode 2 - https://www.group-ib.com/blog/dark-pink-episode-2/

- CISA Adds One Known Exploited Vulnerability to Catalog - https://www.cisa.gov/news-events/alerts/2023/05/31/cisa-adds-one-known-exploited-vulnerability-catalog

- Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector - https://threatmon.io/reverse-engineering-rokrat-a-closer-look-at-apt37s-onedrive-based-attack-vector/ 

[Ficha técnica]

Apresentação: Carlos Cabral

Roteiro: Carlos Cabral e Daniel Venzi

Edição de áudio: Paulo Arruzzo

Narração de encerramento: Bianca Garcia

Projeto gráfico: Julian Prieto