Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Volt Typhoon and the Risk to Critical Infrastructure

Автор: RunSafe Security Inc.

Загружено: 2025-04-11

Просмотров: 106

Описание:

In the debut episode of “Exploited: The Cyber Truth,” host Paul Ducklin talks with Joseph M. Saunders, CEO and Founder of RunSafe Security, about the serious threat Volt Typhoon poses to critical infrastructure in the U.S. and beyond. What makes this Chinese state-sponsored group so dangerous, and how are they exploiting the software in devices that make our world run?

Joe breaks it all down, explaining the big-picture geopolitical motivations behind these attacks. You’ll also learn how attackers use memory-based vulnerabilities to quietly gain long-term access to critical systems without leaving obvious clues.

In this episode:

• How Volt Typhoon is targeting critical infrastructure in sectors like transportation, communications, and financial services to create potential footholds for future conflicts
• Why memory-based vulnerabilities are a major risk, enabling attacks that are hard to detect and trace
• Practical ways to secure systems—like rewriting code in memory-safe languages or using advanced memory protection techniques like load-time function randomization
• How Secure by Design and Secure by Demand initiatives can drive adoption of practices to improve cybersecurity in critical infrastructure

Volt Typhoon and the Risk to Critical Infrastructure

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Что обнаружено после взлома разработчика электронных повесток?

Что обнаружено после взлома разработчика электронных повесток?

Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure

Volt Typhoon: Unpacking State Sponsored Living-Off-the-Land Attacks on Critical Infrastructure

How China Hacked the USA from the inside

How China Hacked the USA from the inside

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler | SpyCast

Can Taiwan Survive a Digital Siege?

Can Taiwan Survive a Digital Siege?

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

When Vehicles Aren’t Just Machines: Cybersecurity, Autonomy & What’s Next

CyberWar Threat (2015) | Full Documentary | NOVA

CyberWar Threat (2015) | Full Documentary | NOVA

Hiding in Plain Sight: Hunting Volt Typhoon Cyber Actors

Hiding in Plain Sight: Hunting Volt Typhoon Cyber Actors

Spy Chat with Chris Costa | Special Guest: Paul Whelan

Spy Chat with Chris Costa | Special Guest: Paul Whelan

Weapons Cybersecurity: The Challenges Facing Aerospace and Defense

Weapons Cybersecurity: The Challenges Facing Aerospace and Defense

Как Micron строит крупнейшую фабрику по производству микросхем в США, несмотря на запрет Китая

Как Micron строит крупнейшую фабрику по производству микросхем в США, несмотря на запрет Китая

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Are Hackers the Biggest Threat to American Infrastructure? | Vice News

Are Hackers the Biggest Threat to American Infrastructure? | Vice News

Ways Volt Typhoon Bypasses Security and How To Prevent It | Happy Hunting

Ways Volt Typhoon Bypasses Security and How To Prevent It | Happy Hunting

Hackers, malware and the darknet - The fatal consequences of cyberattacks | DW Documentary

Hackers, malware and the darknet - The fatal consequences of cyberattacks | DW Documentary

Что такое управление уязвимостями? (объяснение экспертов)

Что такое управление уязвимостями? (объяснение экспертов)

the hacker’s roadmap (how to get started in IT in 2025)

the hacker’s roadmap (how to get started in IT in 2025)

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

What the 2025 SBOM Minimum Elements Mean for Software Supply Chain Security

⚡️АСЛАНЯН: ЭТО ВИДЕО РВЁТ интернет! Путина СПАЛИЛИ на камеру. СРОЧНЫЙ УКАЗ по

⚡️АСЛАНЯН: ЭТО ВИДЕО РВЁТ интернет! Путина СПАЛИЛИ на камеру. СРОЧНЫЙ УКАЗ по "СВО". Теперь всё ясно

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

When Open Source Gets You Into Hot Water: Copyleft Risk in Embedded Systems

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]