
MirrorFace Strikes Again: China’s APT10 Returns with ANEL & AsyncRAT
Failed to add items
Sorry, we are unable to add the item because your shopping cart is already at capacity.
Add to basket failed.
Please try again later
Add to Wish List failed.
Please try again later
Remove from Wish List failed.
Please try again later
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
China’s MirrorFace (APT10) used ANEL & AsyncRAT for cyber espionage. GitHub supply chain attacks compromised 23,000 repos. A ChatGPT SSRF exploit targeted U.S. government agencies. Apache Tomcat RCE and Apple’s Passwords app flaw exposed users. Google’s OSV-Scanner 2.0 boosts open-source security, while Singapore’s HSA pushes medical device cybersecurity. AI-driven threats rise, demanding stronger defenses.
Reference: https://www.linkedin.com/newsletters/hacker-hacks-7126276864670670848/
activate_mytile_page_redirect_t1
What listeners say about MirrorFace Strikes Again: China’s APT10 Returns with ANEL & AsyncRAT
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.