Ben Exposes The Break-In
28:40–29:45 · 65s
Using a honeypot, Ben shows how hackers abused a bug to pivot from residential proxies into people’s home networks, revealing the mechanism powering Kim Wolf.
28:40–29:45 · 65s
Using a honeypot, Ben shows how hackers abused a bug to pivot from residential proxies into people’s home networks, revealing the mechanism powering Kim Wolf.
We use cookies to understand how you use our platform and to improve your experience. Click "Accept All" to consent, or "Decline non-essential" to opt out of non-essential cookies. Read our Privacy Policy.