DISCARDED: Tales From the Threat Research Trenches

By Proofpoint

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Proofpoint

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 13
Reviews: 0
Episodes: 54

Description

DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.
Welcome to DISCARDED

Episode Date
Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor
Apr 02, 2024
A Trip Down Malware Lane: How Today's Hottest Malware Stacks Up Against Predecessors
Mar 19, 2024
Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
Mar 05, 2024
From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions
Feb 20, 2024
Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone
Feb 06, 2024
Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024
Jan 23, 2024
Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024
Jan 09, 2024
Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit
Dec 26, 2023
I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits
Dec 12, 2023
MITRE ATT&CK Evolves with Cyber Threat Sophistication
Nov 29, 2023
Looking Behind the Curtain at the Palestinian-Aligned TA402
Nov 14, 2023
Unmasking the Tricksters: The World of Fake Browser Updates
Oct 31, 2023
Decoding the Malware Maze: Insights From a Threat Researcher
Oct 17, 2023
Obfuscated: Online Threats and the Visually Impaired
Oct 04, 2023
DISCARDED: Live with John Hultquist!
Sep 22, 2023
From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave
Sep 05, 2023
Everything Comes Back in Style: How Old TTPs are Remerging in China's E-Crime Ecosystem
Aug 22, 2023
It Works on My Machine: Why and How Engineering Skills Matter in Threat Research
Aug 08, 2023
An Apple a Day Won't Keep Iranian APT Away: How TA453 Targets Macs
Jul 25, 2023
Threats and Risks in the Global South
Jul 11, 2023
Weird & Wacky Researcher Summer: The Artifacts & Detections Edition
Jun 27, 2023
It's Summertime: What’s the E-crime Vibe?
Jun 14, 2023
When the Threat Profile is High: Protecting At-Risk Individuals Online
May 30, 2023
The Spies and Stalkers of Surveillance Capitalism
May 16, 2023
Beyond Banking: IcedID Gets Forked
May 02, 2023
“Did I miss you in Orlando?”: The Rise of SMS Phishing
Apr 18, 2023
Staying Ahead of Cloud-Based Threats: Insights on today's threat landscape
Apr 07, 2023
Cat-phishing Dogfighters
Mar 21, 2023
Prank or Propaganda? TA499 Pesters Politics
Mar 07, 2023
A Venture Mindset: North Korean Actors Go Beyond Espionage
Feb 21, 2023
Why Do We Click? Understanding the Psychology of Social Engineering
Feb 08, 2023
New Year, New Threats: Prepping for the 2023 Threat Landscape
Jan 24, 2023
Confidence, confusion, cashout: How pig butchering is blindsiding victims
Jan 10, 2023
Holiday Happy Hour: 12 Faves of Threat Research
Dec 28, 2022
AMA Answers From the Threat Research Trenches
Dec 13, 2022
The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox
Nov 29, 2022
Machine Learning Is a Party With Camp Disco!
Nov 09, 2022
Reservation Confirmed: Threat Actors Visiting the Hospitality World
Oct 25, 2022
The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo
Oct 11, 2022
Investigating Wine Fraud with the Ransomware Sommelier
Sep 27, 2022
Hot off the Press: APT Actors Posing as Journalists
Sep 13, 2022
Misfits Managed: Breaking Down Misfit Malware
Aug 23, 2022
The Art of Threat Detection Engineering
Aug 09, 2022
APT Attribution: Trials and Tribulations From the Field
Jul 26, 2022
The Dark-Side of Cryptocurrency
Jul 12, 2022
A Day in the Life of a Threat Researcher: Emerging Threats Edition
Jun 21, 2022
The Buzz on Bumblebee Malware
Jun 07, 2022
Social Engineering: How Threat Actors Manipulate Their Targets
May 24, 2022
Paying Attention to BEC: The Most Costly Threat by Individual Losses
May 10, 2022
Web Bugs & the Tubthumping Tactics of Chinese Threat Actor TA416
Apr 26, 2022
Defending Against Cyber Criminals: Emotet’s Resurrection & Conti’s Implosion
Apr 12, 2022
Threat Actor 2541: The Latest Tricks & Patterns
Mar 29, 2022
The Troubling Rise of MFA Kits
Mar 15, 2022
Discussing RTF Template Injection: A Malicious Phishing Attempt
Mar 02, 2022