𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧
📈 Find our infographics and receive your
own 👕 Threat Talks T-shirt: threat-talks.com
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
#cybersecurityexperts #threatintelligence #zeroday #threattalks
𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧
📈 Find our infographics and receive your own 👕 Threat Talks T-shirt: threat-talks.com
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
#cybersecurityexperts #threatintelligence #zeroday #threattalks
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats.
We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals.
Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and stay secure!