
Vigilance isn’t purely receptive. Without criticism, it will become blind with detail.
CyberWire Daily
00:00
Exploiting a Flaw, Malvertizing, Data Breach, and Phishing Attacks
This chapter discusses the exploitation of a flaw in zip archives, with threat actors from Russia and China being involved. It also covers a malvertizing campaign, a data breach, QR code phishing, and guidance from the US National Security Agency on phishing attacks.
Play episode from 03:01
Transcript


