The Book ReviewThe New York Times
In this edition of Between Two Nerds Tom Uren and The Grugq talk about how states have very different approaches to controlling cyber operations.
At the very beginning they refer to this Microsoft Threat Intelligence post.
Show notes Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis
Dansk
Danmark