𝐈𝐬 𝐭𝐡𝐞 𝐒𝐚𝐧𝐝 𝐄𝐚𝐠𝐥𝐞 𝐀𝐏𝐓 𝐭𝐡𝐞 𝐉𝐚𝐬𝐨𝐧 𝐁𝐨𝐮𝐫𝐧𝐞 𝐨𝐟 𝐜𝐲𝐛𝐞𝐫-𝐚𝐭𝐭𝐚𝐜𝐤𝐬? 🕶️
Just as Bourne eluded the most advanced surveillance and security systems in the world, the Sand Eagle APT made headlines 📰 for its ability to infiltrate and bypass layers of digital defense on supposedly the most secure devices on the market – iPhones. 📱
From exploiting legacy system vulnerabilities to the use of advanced return-oriented programming, this APT made use of not one, not two, but four zero-days to reach its goal – cyber espionage.Host Lieuwe Jan Koning is joined by Martijn Peijer (Cybersecurity Expert SOC at the Dutch Tax Office) and Rob Maas (Field CTO at ON2IT) for this break down on how this threat operated undetected for so long, what the goal was and the immense resources likely involved in its development.
🎧 𝐓𝐮𝐧𝐞 𝐢𝐧 𝐭𝐨 𝐞𝐩𝐢𝐬𝐨𝐝𝐞 32 𝐨𝐟 𝐓𝐡𝐫𝐞𝐚𝐭 𝐓𝐚𝐥𝐤𝐬! 🎧
📈 Find our infographics and receive your
own 👕 Threat Talks T-shirt: threat-talks.com
🕵️ Threat Talks is a collaboration between ON2IT and AMS-IX
#cybersecurityexperts #threatintelligence #zeroday #threattalks