Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead. Support the show Watch full episodes at youtu...
All content for Secure AF - A Cybersecurity Podcast is the property of Alias Cybersecurity and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead. Support the show Watch full episodes at youtu...
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
Secure AF - A Cybersecurity Podcast
7 minutes
2 weeks ago
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
Secure AF - A Cybersecurity Podcast
Got a question or comment? Message us here! 🎙️ A new threat is making waves ... Atroposia RAT, a remote access trojan that doesn’t just infiltrate systems but scans them for vulnerabilities to exploit further. In this episode, we break down how this modular malware operates, how it hides, and why its built-in scanner is a game-changer for attackers. Learn the detection cues, patching priorities, and defensive measures SOC teams need to stay ahead. Support the show Watch full episodes at youtu...