[Referências do Episódio]
- Tempest Vuln Watchlist - https://www.tempest.com.br/gerenciamento/threat-intelligence/vuln-watchlist/#contact
- SUPPLY CHAIN RISK FROM GIGABYTE APP CENTER BACKDOOR - https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/
- Dark Pink. Episode 2 - https://www.group-ib.com/blog/dark-pink-episode-2/
- CISA Adds One Known Exploited Vulnerability to Catalog - https://www.cisa.gov/news-events/alerts/2023/05/31/cisa-adds-one-known-exploited-vulnerability-catalog
- Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector - https://threatmon.io/reverse-engineering-rokrat-a-closer-look-at-apt37s-onedrive-based-attack-vector/
[Ficha técnica]
Apresentação: Carlos Cabral
Roteiro: Carlos Cabral e Daniel Venzi
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia
Projeto gráfico: Julian Prieto