
Episode 170: The Evasive Adversary
The Cyber Threat Perspective
00:00
Rapid exploitation after public disclosure
Spencer gives examples of exploits appearing days after proofs-of-concept and vendor disclosures.
Play episode from 23:29
Transcript


