Listen

Description

Your GPU knows your secrets

UPnP behind Eternal Silence router campaign

DeFi platform hacked for $80 million

Thanks to our episode sponsor, Pentera

To understand the exploitable attack surface, take the adversarial perspective. The way to know which vulnerabilities are exploitable is to…well, exploit them. This way, security teams get a concise attack vector pointing to the organization’s weakest link. From here remediation requests handed to IT are focused, manageable, and based on true business impact. Find out more at pentera.io