Defensive Security Podcast

Information Security Podcast

Skip to content
  • About
  • Resources
    • Forensics
      • Security News
    • Penetration Testing
    • Incident Response
    • Useful Sites
    • Malware Analysis
    • Recommended Books
    • Industry Reports
    • Vulnerabilities
    • Essential Reading
    • Malware Tools
    • Security Podcasts
    • Best Practices
  • Podcast Episodes
  • iTunes
  • Stitcher
  • Donate!
  • Store
  • Entering The Infosec Biz

Defensive Security Podcast Episode 124

July 19, 2015PodcastHacking Team, SAPjb
https://media.blubrry.com/1463551/content.blubrry.com/1463551/defensive-security-podcast-episode-124.mp3

Podcast: Play in new window | Download | Embed

Subscribe: RSS

http://arstechnica.com/tech-policy/2015/07/hacking-teams-surveillance-software-sold-to-kgb-successor/

http://arstechnica.com/security/2015/07/hackingteams-evil-android-app-had-code-to-bypass-google-play-screening/

http://www.scmagazine.com/ios-devices-dont-have-to-be-jailbroken-for-spyware-sold-by-hacking-team-to-be-installed/article/426137/

https://krebsonsecurity.com/2015/07/hacking-team-used-spammer-tricks-to-resurrect-spy-network/

http://www.scmagazine.com/fireeye-intern-morgan-culbertson-arrested-in-darkode-bust/article/427139/2/

http://erpscan.com/wp-content/themes/supercms/Publications/Chinese_attack_on_USIS_using_SAP_vulnerability_Detailed_review_and_comments.pdf

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

Related

Post navigation

← Defensive Security Podcast Episode 123 Defensive Security Podcast Episode 125 →

Leave a Reply Cancel reply

You must be logged in to post a comment.

Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Support The Podcast

Defensive Security Store

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Tags

  • adobe
  • Anthem
  • Anti Virus
  • APT
  • breach
  • Cold Fusion
  • cyber insurance
  • data breach
  • DBIR
  • DDOS
  • dns
  • Equifax
  • exploit
  • FTC
  • hacking
  • Hacking Team
  • heartbleed
  • HIPAA
  • Home Depot
  • information security
  • infosec
  • insider threat
  • Java
  • malvertising
  • malware
  • microsoft
  • NotPetya
  • NSA
  • OPM
  • passwords
  • PCI
  • phishing
  • POS
  • ransomeware
  • Ransomware
  • security
  • Security awareness training
  • social engineering
  • Sony
  • Syrian Electronic Army
  • Target
  • threat intelligence
  • vulnerabilities
  • wannacry
  • Yahoo
Proudly powered by WordPress