659 - 1ª vuln encontrada por IA é documentada
Description
[Referências do Episódio]
[TREND MICRO NO FORRESTER] - https://www.trendmicro.com/explore/forrester-wave-xdr/01054-v1-en-www
From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code - https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html
G700 : The Next Generation of Craxs RAT - https://www.cyfirma.com/research/g700-the-next-generation-of-craxs-rat/
The curious case of the 7777-Botnet - https://gi7w0rm.medium.com/the-curious-case-of-the-7777-botnet-86e3464c3ffd
7777-Botnet Infection Vectors - https://vulncheck.com/blog/ip-intel-7777-botnet
Solving the 7777 Botnet enigma: A cybersecurity quest - https://blog.sekoia.io/solving-the-7777-botnet-enigma-a-cybersecurity-quest/
A glimpse into the Quad7 operators’ next moves and associated botnets - https://blog.sekoia.io/a-glimpse-into-the-quad7-operators-next-moves-and-associated-botnets/
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network - https://www.microsoft.com/en-us/security/blog/2024/10/31/chinese-threat-actor-storm-0940-uses-credentials-from-password-spray-attacks-from-a-covert-network/
Roteiro e apresentação: Carlos Cabral e Bianca Oliveira
Edição de áudio: Paulo Arruzzo
Narração de encerramento: Bianca Garcia