Latest Threats Podcast Episodes

YusufOnSecurity.com artwork

168 - Preparing for and responding to ransomeware attack - Part 2

YusufOnSecurity.com - April 20, 2024 19:00 - 33 minutes
In this week's episode, we will continue with part 2 on "Preparing for and responding to ransomeware attack" As I said last week, ransomware is a threat that will be around us for the foreseeable future. Do listen to part 1 before you listen to this episode. With that out of the way, lets have ...

YusufOnSecurity.com artwork

167 - Preparing for and responding to ransomeware attack

YusufOnSecurity.com - April 13, 2024 19:00 - 34 minutes
Ransomware is a threat that will be around us for the foreseeable future.  In this week's episode we will look at the history of ransomware, the common TTPs in use by threat actors such as Turla, how to align our incident response to that threat and others, and finally how to contain, eradicate,...

The Defender's Advantage Podcast artwork

Assessing the State of Multifaceted Extortion Operations

The Defender's Advantage Podcast - April 11, 2024 10:00 - 40 minutes ★★★★ - 15 ratings
Kimberly Goody, Head of Mandiant's Cyber Crime Analysis team and Jeremy Kennelly, Lead Analyst of the same team join host Luke McNamara to breakdown the current state of ransomware and data theft extortion. Kimberly and Jeremy describe how 2023 differed from the activity they witnessed the year ...

YusufOnSecurity.com artwork

166 - The SysInternal Utilities

YusufOnSecurity.com - April 06, 2024 19:00 - 46 minutes
This week we will dive into a collection of powerful system utilities and tools designed to help users diagnose, troubleshoot, and monitor Windows operating system. These utilities provide advanced functionality beyond what is typically available in Windows, as they offer insights into system in...

YusufOnSecurity.com artwork

165 - How AI is helping Incident Responders

YusufOnSecurity.com - March 30, 2024 19:00 - 35 minutes
AI is getting into all sorts of places but no less than in cybersecurity in both a good way and bad ways. In a good way with bolstering Incident response live cycle but unfortunately in a bad way with generating convincing phishing email or assisting with script and coding etc. In this week's e...

The Defender's Advantage Podcast artwork

Hunting for "Living off the Land" Activity

The Defender's Advantage Podcast - March 29, 2024 13:00 - 42 minutes ★★★★ - 15 ratings
Host Luke McNamara is joined by Mandiant consultants Shanmukhanand Naikwade and Dan Nutting to discuss hunting for threat actors utilizing "living off the land" (LotL) techniques. They discuss how LotL techniques differ from traditional malware based attacks, ways to differentiate between normal...

SecurityWeek Podcast Series - Cybersecurity Insights artwork

Fireside Chat: Abhishek Arya, Head of Google's Open Source Security Team

SecurityWeek Podcast Series - Cybersecurity Insights - March 26, 2024 16:00 - 31 minutes ★★★★★ - 2 ratings
In this exclusive fireside chat, SecurityWeek editor-at-large Ryan Naraine interviews Abhishek Arya, Director of Engineering on Google’s open source and supply chain security teams.  We cover the evolving landscape of Software Supply Chain security, highlighting key advancements, challenges, res...

YusufOnSecurity.com artwork

164 - What Is Platform Approach To Security? - Part 2

YusufOnSecurity.com - March 23, 2024 12:00 - 32 minutes
In our second episode, we continue exploring  the  concept of adopting a platform security.  In this second part we will continue where we left off from last week and will encourage you to listed to the first episode if you have not done so. Before we get into the main topic, lets touch one imp...

OUR AMERICAN SECURITY artwork

Fortifying Businesses Against Uncertainty: Strategic Resilience with BRaaSS LLC

OUR AMERICAN SECURITY - March 21, 2024 15:00 - 42 minutes
Join us for an eye-opening discussion with the specialists from BRaaSS (Business Resilience as a Security Service) LLC, where you'll uncover the secrets to fortifying your business against the unexpected. In a landscape where threats loom on every horizon, we navigate the complexities of operati...

YusufOnSecurity.com artwork

163 - What Is Platform Approach To Security? - Part 1

YusufOnSecurity.com - March 16, 2024 19:00 - 34 minutes
Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. In this episode, we explore  the recently much talked about concept of adopting a platform security. As technology advances, cyber criminals c...

YusufOnSecurity.com artwork

163 - What is platform approach to security? - Part 1

YusufOnSecurity.com - March 16, 2024 19:00 - 34 minutes
Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. In this episode, we explore  the recently much talked about concept of adopting a platform security. As technology advances, cyber criminals c...

The Defender's Advantage Podcast artwork

Director of NSA's Cybersecurity Collaboration Center on Trends in 2024

The Defender's Advantage Podcast - March 14, 2024 18:00 - 25 minutes ★★★★ - 15 ratings
Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon and other threat actors utilizing living off the land (LotL) techniques, zero-day exploitation trends, how the CCC works with private sector organiz...

OUR AMERICAN SECURITY artwork

Mastering the Art of Threat Hunting: A Cybersecurity Deep Dive

OUR AMERICAN SECURITY - March 12, 2024 13:00 - 52 minutes
Embark on an enthralling expedition with me, Bobby L Sheppard, as I welcome the formidable Jay D. Anderson to dissect the crucial elements of threat hunting in cybersecurity. Drawing from his extensive background as a US Army Special Forces operator and federal police officer, Jay D. Anderson in...

YusufOnSecurity.com artwork

162 - LEAP 2024 - Riyadh

YusufOnSecurity.com - March 09, 2024 18:00 - 28 minutes
It was the LEAP event this past week. LEAP is a technology event in Saudi Arabia, Riyadh and it attracts every technology company imaginable especially in the cyber security domain. This is year was no different. At LEAP, I met with Port53, a firm that helps from SMB to enterprise businesses wi...

YusufOnSecurity.com artwork

161 - Qatar Web Summit

YusufOnSecurity.com - March 02, 2024 19:00 - 45 minutes
This week I attended Qatar Web Summit. This is a technology and start-up summit held yearly in Doha, Qatar. There were a lot going on and I am lucky to have spent time with the Ken Fee, the CEO of Business Technology Architect shorten as BTA where we talked about security, network optimisation a...

OUR AMERICAN SECURITY artwork

The State of Our American Security: The Complexities of Global Security, From Cyber Threats to International Diplomacy

OUR AMERICAN SECURITY - February 28, 2024 02:00 - 47 minutes
Join us, Bobby L Sheppard and Jay D. Anderson, as we dissect critical global and national security issues with a rare blend of military, intelligence, and law enforcement candor. Our inaugural episode promises riveting, ground-level insights into cyber threat hunting, counterterrorism, and force...

OUR AMERICAN SECURITY artwork

The State of Security: The Complexities of Global Security, From Cyber Threats to International Diplomacy

OUR AMERICAN SECURITY - February 28, 2024 02:00 - 47 minutes
Join us, Bobby L Sheppard and Jay D. Anderson, as we dissect critical global and national security issues with a rare blend of military, intelligence, and law enforcement candor. Our inaugural episode promises riveting, ground-level insights into cyber threat hunting, counterterrorism, and force...

YusufOnSecurity.com artwork

160 - The Hidden Risks of Default Configurations - Part 2

YusufOnSecurity.com - February 24, 2024 19:00 - 45 minutes
In this episode, we are continuing with part 2 of the risks paused by default configuration. As I said last week, while default config is convenient for initial setup, these  settings are may introduce significant security risks that can leave systems vulnerable to exploitation by malicious acto...

The Defender's Advantage Podcast artwork

The North Korean IT Workers

The Defender's Advantage Podcast - February 21, 2024 21:00 - 34 minutes ★★★★ - 15 ratings
Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic of Korea's (DPRK) usage of IT workers to gain access to enterprises.  For more on Mandiant's analysis of North Korea's cyber capabilities, please ...

YusufOnSecurity.com artwork

159 - The Hidden Risks of Default Configurations - Part 1

YusufOnSecurity.com - February 17, 2024 18:00 - 37 minutes
In today's interconnected world, default configurations are ubiquitous across various systems and devices, from routers to software applications. While convenient for initial setup, these default settings often harbor significant security risks that can leave systems vulnerable to exploitation b...

YusufOnSecurity.com artwork

158 - Is quantum computing a threat to cryptography, really? - Part 2

YusufOnSecurity.com - February 10, 2024 19:00 - 37 minutes
This is the second episode of our two part episode on whether quantum computing is a threat to cryptography really. Make sure you listen to episode 1 first as we laid the foundation on what is coming up in this episode. As always lets review this week's top trending security news first. CISA a...

The Defender's Advantage Podcast artwork

Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO

The Defender's Advantage Podcast - February 07, 2024 21:00 - 44 minutes ★★★★ - 15 ratings
Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara to discuss their takeaways from the last year of threat activity witnessed by enterprises within healthcare and life sciences. They discuss apply...

YusufOnSecurity.com artwork

157 - Is quantum computing a threat to cryptography, really? - Part 1

YusufOnSecurity.com - February 03, 2024 19:00 - 39 minutes
Cryptography are the backbone of privacy since time immemorial. Toda is THE foundational block of the connected world without which the Internet will crumble as we know it. There is a feverish discussions happening and fast improving of a new era in computing - Quantum computing, and it is impro...

YusufOnSecurity.com artwork

157 - Is quantum computing a threat to cryptography, really?

YusufOnSecurity.com - February 03, 2024 19:00 - 39 minutes
Cryptography are the backbone of privacy since time immemorial. Toda is THE foundational block of the connected world without which the Internet will crumble as we know it. There is a feverish discussions happening and fast improving of a new era in computing - Quantum computing, and it is impro...

SecurityWeek Podcast Series - Cybersecurity Insights artwork

Palo Alto Networks Talks IT/OT Convergence

SecurityWeek Podcast Series - Cybersecurity Insights - January 29, 2024 14:00 - 20 minutes ★★★★★ - 2 ratings
In this episode, SecurityWeek editor-at-large Ryan Naraine interviews Del Rodillas, Senior Director of Product Management at Palo Alto Networks, about the integration of IT and OT in the ICS threat landscape. We discuss the evolution of cyber resilience, the challenges of merging IT and OT gover...

YusufOnSecurity.com artwork

156 - The risks of exposing Web UI

YusufOnSecurity.com - January 27, 2024 18:00 - 46 minutes
Welcome and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain english. Accessing and managing various applications and services remotely is a daily occurrence for a typical administrator. It is often the fastest w...

The Defender's Advantage Podcast artwork

Is The CTI Lifecycle Due For An Update?

The Defender's Advantage Podcast - January 25, 2024 13:00 - 28 minutes ★★★★ - 15 ratings
Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his  blog on the CTI Process Hyperloop and applying threat intelligence to the needs of the security organization and larger enterprise.  For more on this topic, please see: https://www.mandiant.com/resources/blog/c...

YusufOnSecurity.com artwork

155 - iVanti's widespread exploitation

YusufOnSecurity.com - January 20, 2024 17:00 - 42 minutes
When things go wrong, they go wrong fast. This week will dive into the widespread exploitation on iVanti VPN solution that attracted a lot of attention from both the security community as well as from the bad guys. What went wrong? Stay tuned. Just before we get into iVanti, lets review the othe...

YusufOnSecurity.com artwork

154 - Exfil or DLP - Part 2

YusufOnSecurity.com - January 13, 2024 03:00 - 37 minutes
We are continuing demystifying a couple of terms that folks new to the realm of cyber security often mix up. Those are the  terms Exfil or DLP.  So by the end of the session you will surely understand where you stand the next time you will hear an Exfil has happened to so and so org or a DLP is ...

The Defender's Advantage Podcast artwork

Threat Trends: Hacktivists' Continued Use of DDoS

The Defender's Advantage Podcast - January 10, 2024 18:00 - 44 minutes ★★★★ - 15 ratings
For our first episode of 2024, host Luke McNamara is joined by Mandiant Senior Technical Director Jose Nazario and Principal Analysts Alden Wahlstrom and Josh Palatucci, to discuss the hacktivist DDoS activity they tracked over the last year.