Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
| Episode | Date |
|---|---|
|
How Android Combats Mobile Scams
|
Jan 16, 2026 |
|
UNC5221 and the BRICKSTORM Campaign
|
Oct 22, 2025 |
|
How vSphere Became a Target for Adversaries
|
Sep 15, 2025 |
|
AI Tools and Sentiment Within the Underground Cyber Crime Community
|
Aug 18, 2025 |
|
Protecting the Core: Securing Protection Relays in Modern Substations
|
Jul 28, 2025 |
|
The Rise of ClickFix
|
Jul 15, 2025 |
|
Vishing in the Wild
|
Jun 04, 2025 |
|
Responding to a DPRK ITW Incident
|
May 19, 2025 |
|
UNC5221 and The Targeting of Ivanti Connect Secure VPNs
|
May 05, 2025 |
|
Windows Remote Desktop Protocol: Remote to Rogue
|
Apr 14, 2025 |
|
Cybersecurity Conversations with the C-Suite and Board
|
Mar 10, 2025 |
|
What to Watch For in 2025
|
Feb 28, 2025 |
|
Signals of Trouble
|
Feb 19, 2025 |
|
Agentic AI in Cybersecurity
|
Feb 05, 2025 |
|
The Art of Remediation in Incident Response
|
Dec 02, 2024 |
|
How to Run an Effective Tabletop Exercise
|
Oct 18, 2024 |
|
Using LLMs to Analyze Windows Binaries
|
Oct 04, 2024 |
|
How Threat Actors Bypass Multi-Factor Authentication
|
Sep 26, 2024 |
|
TAG's Work Tracking Commercial Surveillance Vendors
|
Sep 04, 2024 |
|
What Iranian Threat Actors Have Been Up To This Year
|
Jul 25, 2024 |
|
Mandiant's Approach to Securely Using AI Solutions
|
Jun 27, 2024 |
|
Lessons Learned from Responding to Cloud Compromises
|
Jun 03, 2024 |
|
The ORB Networks
|
May 22, 2024 |
|
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
|
May 16, 2024 |
|
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
|
Apr 29, 2024 |
|
Assessing the State of Multifaceted Extortion Operations
|
Apr 11, 2024 |
|
Hunting for "Living off the Land" Activity
|
Mar 29, 2024 |
|
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
|
Mar 14, 2024 |
|
The North Korean IT Workers
|
Feb 21, 2024 |
|
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO
|
Feb 07, 2024 |
|
Is The CTI Lifecycle Due For An Update?
|
Jan 25, 2024 |
|
Threat Trends: Hacktivists' Continued Use of DDoS
|
Jan 10, 2024 |
|
Threat Trends: Tales from the 2023 Trenches
|
Dec 12, 2023 |
|
Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia
|
Oct 25, 2023 |
|
Threat Trends: Addressing Risk in the Cloud with Wiz
|
Oct 19, 2023 |
|
Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout
|
Sep 20, 2023 |
|
Threat Trends: The Implications of the MOVEit Compromise
|
Jul 20, 2023 |
|
Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence
|
Jun 16, 2023 |
|
Frontline Stories: Crisis Communications During a Breach
|
Jun 06, 2023 |
|
Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting
|
May 26, 2023 |
|
Frontline Stories: The Executive's Role in Cybersecurity
|
May 17, 2023 |
|
Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence?
|
May 09, 2023 |
|
Threat Trends: M-Trends 2023
|
Apr 24, 2023 |
|
Frontline Stories: Exposure Management Beyond Vulnerabilities
|
Apr 11, 2023 |
|
Threat Trends: How APT43 Targets Security Policy Experts Focused on North Korea
|
Mar 28, 2023 |
|
Threat Trends: A Retrospective on Zero-Days in 2022 with Project Zero and Mandiant
|
Mar 20, 2023 |
|
Threat Trends: Head of TAG on Commercial Spyware, Cyber Activity in Eastern Europe and More
|
Feb 23, 2023 |
|
Frontline Stories: A CISO's Perspective on Managing a Breach
|
Feb 16, 2023 |
|
Threat Trends: An Episode (Mostly) About Non-Ransomware Cyber Crime
|
Feb 10, 2023 |
|
Threat Trends: APT by USB
|
Jan 19, 2023 |
|
Skills Gap: Addressing the Cyber Mobilization Crisis
|
Jan 12, 2023 |
|
Frontline Stories: Get the Facts on Fraud
|
Jan 05, 2023 |
|
Threat Trends: A Year in Review with Sandra Joyce
|
Dec 15, 2022 |
|
Frontline Stories: A Conversation on Third-Party Risk Management
|
Dec 08, 2022 |
|
Skills Gap: Transitioning from Military Service to a Role in Cyber
|
Dec 01, 2022 |
|
Threat Trends: Reflections on Russian Cyber Threat Activity During the War in Ukraine
|
Nov 23, 2022 |
|
Frontline Stories: Cyber Insurance to Make Companies Safer
|
Nov 17, 2022 |
|
Threat Trends: Tracking DPRK Use of Cryptocurrencies
|
Nov 10, 2022 |
|
Skills Gap: Finding Your Fit in Cyber
|
Nov 03, 2022 |
|
Threat Trends: Inside Google Cloud's Threat Horizons Report
|
Oct 27, 2022 |
|
Skills Gap: More Than a Resume
|
Oct 20, 2022 |
|
Threat Trends: The Threat Landscape in APJ
|
Oct 13, 2022 |
|
Frontline Stories: The Evolution of the CISO
|
Oct 06, 2022 |
|
Threat Trends: Metador, Mercenaries, and LABScon with SentinelOne
|
Sep 29, 2022 |
|
Threat Trends: The Security Landscape Facing Manufacturing
|
Sep 21, 2022 |
|
Skills Gap: Expanding Diversity in Cyber Security
|
Sep 15, 2022 |
|
Threat Trends: APT42 - Crooked Charms, Cons, and Compromises
|
Sep 07, 2022 |
|
Frontline Stories: Discussing the Impact of CISA KEV with Nucleus Security
|
Sep 01, 2022 |
|
Skills Gap: Building a Successful Security Operations Team
|
Aug 18, 2022 |
|
Threat Trends: Building Cyber Resiliency Within Financial Services with FS-ISAC
|
Aug 11, 2022 |
|
Frontline Stories: Shields Up, Mandiant
|
Aug 04, 2022 |
|
Threat Trends: Securing the Vote in 2022
|
Jul 28, 2022 |
|
Skills Gap: Looking Beyond the Unicorn Candidate
|
Jul 21, 2022 |
|
Threat Trends: How Adversaries Are Leveraging AI in Cyber Operations
|
Jul 14, 2022 |
|
Bonus: Securing OT/ICS Systems with Nozomi Networks
|
Jul 07, 2022 |
|
Threat Trends: An Interview with the Danish Tech Ambassador
|
Jun 30, 2022 |
|
Skills Gap: Bridging the Skills Gap
|
Jun 23, 2022 |
|
Threat Trends: Tracking Threat Actor Usage of Cryptocurrencies with Chainalysis
|
Jun 16, 2022 |
|
Frontline Stories: Introducing Mandiant Digital Risk Protection
|
Jun 06, 2022 |
|
Threat Trends: After the Headlines - Practical Experience of Rebuilding Trust After a Breach
|
Jun 02, 2022 |
|
Frontline Stories: OT/ICS Security
|
May 26, 2022 |
|
Threat Trends: Information Operations Surrounding the Russian Invasion of Ukraine
|
May 18, 2022 |
|
Threat Trends: UNC3524 - Eye Spy on Your Email
|
May 02, 2022 |
|
Threat Trends: Breaking Down the 2022 M-Trends Report
|
Apr 15, 2022 |
|
Threat Trends: The Evolving Threat Landscape in Europe
|
Apr 01, 2022 |
|
Welcome to the Defender's Advantage Podcast
|
Mar 30, 2022 |
|
Left on Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity
|
Feb 24, 2022 |
|
Cyber Threats to the Olympics
|
Feb 10, 2022 |
|
The Role of Contractors in Cyber Operations
|
Jan 27, 2022 |
|
A Year in Review with Kevin Mandia
|
Dec 15, 2021 |
|
Conflict and Escalation in Cyberspace
|
Dec 01, 2021 |
|
Leveraging Military Experience in an InfoSec Career
|
Nov 11, 2021 |
|
Analyzing Vulnerability and Exploitation Activity in 2021
|
Nov 02, 2021 |
|
Covering Cyber Threats and Trends
|
Oct 15, 2021 |
|
The FIN12 Episode
|
Oct 07, 2021 |
|
Disentangling the DPRK
|
Sep 23, 2021 |
|
The Evolving Ransomware Landscape
|
Sep 07, 2021 |
|
Tackling Supply Chain Security
|
Aug 20, 2021 |
|
Assessing Iranian Threat Actors’ Usage of Ransomware
|
Jul 30, 2021 |
|
Fostering CTI Development with Mandiant Intelligence Services
|
Jul 13, 2021 |
|
Filling the CTI Skills Gap with Mandiant On-Demand Cyber Intelligence Training
|
Jun 15, 2021 |
|
Low Sophistication Threat Actors Continue to Target OT
|
Jun 10, 2021 |
|
How Mandiant is Helping Governments Build Cyber Capacity
|
May 19, 2021 |
|
Pandemic Impacts to the Cyber Threat Landscape
|
May 04, 2021 |
|
Automated Defense Brings New Features to Mandiant Advantage
|
Apr 28, 2021 |
|
The Making of an M-Trends Report
|
Apr 22, 2021 |
|
The "Big Four": Spotlight on Russia
|
Apr 12, 2021 |
|
The "Big Four": Spotlight on China
|
Mar 24, 2021 |
|
An Inside Look into How Reddit Fights Cyber Threats
|
Mar 16, 2021 |
|
Tackling Digital Safety for Women
|
Mar 08, 2021 |
|
The "Big Four": Spotlight on Iran
|
Feb 22, 2021 |
|
Breaking Down Malicious Insider Threats
|
Feb 16, 2021 |
|
The Cyber Landscape in Latin America
|
Jan 21, 2021 |
|
The "Big Four": Spotlight on North Korea
|
Jan 11, 2021 |
|
Protecting Healthcare and Academia Against Cyber Threats
|
Dec 03, 2020 |
|
A Look Back and a Look Forward
|
Nov 16, 2020 |
|
Cyber Security Through the Eyes of a Journalist
|
Oct 26, 2020 |
|
The Inception of Mandiant Advantage
|
Oct 14, 2020 |
|
Back to School: Training the Cyber Workforce in 2020
|
Sep 30, 2020 |
|
Ransomware and Observations from Recent IR Investigations
|
Sep 16, 2020 |
|
The Ghostwriter Campaign and Trends in Disinformation Today
|
Aug 31, 2020 |
|
Making Sense of Cyber Threats at Scale with Strategic Intel
|
Aug 21, 2020 |
|
Behind the Scenes with Mandiant Security Validation
|
Jul 31, 2020 |
|
Unique Threats to OT and Cyber Physical Systems
|
Jul 15, 2020 |
|
Eye on APAC: Cyber Security & Threats in Asia Pacific
|
Jun 16, 2020 |
|
Stay Secure While Using Collaboration Platforms
|
May 13, 2020 |
|
Getting Ready for a New Era of COVID-19 Related Phishing
|
May 05, 2020 |
|
A Deeper Discussion About M-Trends 2020, Part Two
|
Apr 21, 2020 |
|
A Deeper Discussion About M-Trends, Part One
|
Apr 18, 2020 |
|
S3E3: M-Trends 2020 Dwell Time is a Swell Time
|
Mar 24, 2020 |
|
The Cloud Revolution and the Future of the SOC
|
Nov 19, 2019 |
|
What to Anticipate When Migrating to the Cloud
|
Nov 19, 2019 |
|
Validating Detection & Response with Purple Team Assessments
|
Oct 22, 2019 |
|
Scaling Up with Digital Threat Monitoring
|
Oct 15, 2019 |
|
The EMEA Cyber Security Threat Landscape
|
Sep 26, 2019 |
|
Innovation Architecture: A New Way of Protecting Our Custome
|
Aug 26, 2019 |
|
Beyond Compliance: Cyber Threats and Healthcare
|
Aug 21, 2019 |
|
FireEye and Beazley: Twice the Defense Against Email Threats
|
Jul 15, 2019 |
|
Protection Beyond the Traditional Secure Email Gateway
|
Mar 14, 2019 |
|
Expertise On Demand with a Click of a Button
|
Mar 12, 2019 |
|
Tracking a Cyber Crime Group: FIN7 at a Glance
|
Aug 15, 2018 |
|
Staying Ahead of a Changing Email Threat Landscape
|
Jul 16, 2018 |
|
Busting the Myths of Vulnerability Management
|
May 16, 2018 |
|
M-Trends 2018: Tales from the Trenches
|
May 09, 2018 |
|
The Future is Bright for FireEye Email Security
|
Apr 24, 2018 |
|
Cyber Threats and the Manufacturing Industry
|
Jan 08, 2018 |
|
Looking Ahead at 2018 w/ FireEye CTO for Cloud Martin Holste
|
Dec 04, 2017 |
|
Looking Ahead at 2018 with FireEye CSO Steve Booth
|
Nov 29, 2017 |
|
Focusing on the Analyst with Helix
|
Nov 01, 2017 |
|
Cyber Threats and The Utilities Sector
|
Oct 10, 2017 |
|
FireEye Govt Email Threat Prevention Receives FedRAMP
|
Jul 17, 2017 |
|
One Year In Review with Kevin Mandia
|
Jun 15, 2017 |
|
Threat Intelligence in the Current Threat Landscape
|
Apr 05, 2017 |
|
The State of Security in the Healthcare Sector
|
Mar 14, 2017 |
|
Critical Infrastructure and ICS Cybersecurity Issues
|
Oct 12, 2016 |
|
Detection Innovations
|
Sep 16, 2016 |
|
Orchestration: Combatting Broken Security Processes
|
Sep 01, 2016 |
|
An Interview with Michael Sikorski, Director, FLARE
|
Aug 11, 2016 |
|
Going Beyond Detect, Respond, Contain
|
Aug 09, 2016 |
|
How 'Not Fitting In’ Changed The Future For Kevin Mandia
|
Aug 08, 2016 |
|
Approaching Security Operational Readiness with Red Team Ops
|
Aug 02, 2016 |
|
People Behind FaaS: Chris Tannery
|
Jul 08, 2016 |
|
People Behind FaaS: Nicole Oppenheim
|
Jul 08, 2016 |
|
People Behind FaaS: Pete Smith
|
Jul 08, 2016 |
|
Findings From The EMEA Regional Advanced Threat Report
|
May 25, 2016 |
|
Security Drills
|
Apr 27, 2016 |
|
John Watters - Discussing Cyber Security and Upcoming Cyber
|
Apr 05, 2016 |
|
Red, Blue and Intuit
|
Mar 30, 2016 |
|
Dropbox and Cloud Security
|
Mar 24, 2016 |
|
Is Your Board On Board with Cyber Strategies?
|
Mar 22, 2016 |
|
Invotas and iSIGHT Partners Acquisition
|
Mar 17, 2016 |
|
Eye on Security: M-Trends 2016
|
Mar 08, 2016 |
|
FireEye Podcast: Signal to Noise
|
Feb 17, 2016 |
|
Eye on Security: Good Enough Is Not Good Enough
|
Jan 27, 2016 |
|
Eye on Security: FireEye Solutions Integration
|
Jan 12, 2016 |