Listen

Description

Binary Analysis With Jupyter and Radare2

https://isc.sans.edu/forums/diary/Binary+Analysis+with+Jupyter+and+Radare2/24748/

IMAP Brute Forcing against Cloud Accounts

https://www.proofpoint.com/us/threat-insight/post/threat-actors-leverage-credential-dumps-phishing-and-legacy-email-protocols

Google Allows GSuite Users to Disable SMS/Voice Authentication

https://gsuiteupdates.googleblog.com/2019/03/more-control-over-2-step-verification-security-phone-sms.html

Sniffing Bitlocker Keys from TPM

https://pulsesecurity.co.nz/articles/TPM-sniffing