Chapter
Wormable Vulnerability Exploited by Hackers
Attackers are exploiting a wormable vulnerability that can propagate rapidly across the internet. Meanwhile, Drada offers cloud compliance software to provide continuous monitoring and visibility of risk, security controls, and audit readiness.
Clips
A wormable exploit can propagate across the internet, infecting vulnerable systems and causing extensive damage.
28:16 - 31:35 (03:18)
Summary
A wormable exploit can propagate across the internet, infecting vulnerable systems and causing extensive damage. It can result in system shutdowns, network congestion, and serious business disruption.
ChapterWormable Vulnerability Exploited by Hackers
Episode57: MS08-067
PodcastDarknet Diaries
The speaker shares their experience in identifying and investigating a cyberattack that was being carried out by a set of hackers across a variety of targets and expanding in scope every day, ultimately leading to the identification of a vulnerability.
31:35 - 35:42 (04:06)
Summary
The speaker shares their experience in identifying and investigating a cyberattack that was being carried out by a set of hackers across a variety of targets and expanding in scope every day, ultimately leading to the identification of a vulnerability.
ChapterWormable Vulnerability Exploited by Hackers
Episode57: MS08-067
PodcastDarknet Diaries
This episode of the Darknet Diaries podcast recounts a little-known story of a mystery bug that infected Windows computers, causing strange behavior.
35:42 - 37:09 (01:27)
Summary
This episode of the Darknet Diaries podcast recounts a little-known story of a mystery bug that infected Windows computers, causing strange behavior. While the source of the bug was never found, this incident would go down in history as one of the most notorious bugs to have ever been found in Windows.