Podcasts
DISCARDED
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns.
Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and control.
Sep 5, 2024
00:27:23
From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions
The esteemed Katie Nickels joins us on the show today! Katie is the Director of Intelligence Operations at Red Canary, and our conversation with her explores a wide array of topics, ranging from career growth in threat intelligence to the intricacies of attribution and threat actor naming.
Sep 5, 2024
00:47:00
Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone
NBC's Kevin Collier discusses his experiences covering cybersecurity stories for a mainstream audience. As the network's first and only dedicated cybersecurity reporter Collier reflects on the evolving nature of cybersecurity media coverage and the increasing need for dedicated coverage in major news publications.
Sep 5, 2024
55:39
Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024
Today’s episode is Part Two of what to expect in cybersecurity in 2024, and our guests are Randy Pargman and Rich Gonzalez. Randy sheds light on the crucial role of the Detections Team and emphasizes the constant innovation of malware authors, and the team’s mission to outsmart them.
Feb 6, 2024
1:06:17
Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024
Today’s episode focuses on insights from Daniel Blackford and Alexis Dorais-Joncas, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.
Jan 10, 2024
45:00
Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit
In this special holiday edition of Discarded, the tables are turned with hosts, Selena and Crista, becoming the answer-ers, our returning moderator, Mindy Semling, as the question asker, and our wonderful audience is transformed into cyber elves.
Dec 27, 2023
1:04:59
I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits
Returning guest is Greg Lesnewich, Senior Threat Researcher at Proofpoint, sheds light on the tactics, techniques, and procedures (TTPs) employed by TA422. The conversation touches on the significance of the high volumes observed starting in late summer, the exploitation of vulnerabilities for NTLM credential harvesting, and the brief usage of the WinRAR vulnerability. Plus, Greg sings!
Feb 9, 2024
50:39
MITRE ATT&CK Evolves with Cyber Threat Sophistication
Take a deep dive with us into the influential MITRE ATT&CK Framework, a comprehensive knowledge base that catalogs real-world threat actor behaviors derived from threat intelligence.
Nov 29, 2023
50:35
Looking Behind the Curtain at the Palestinian-Aligned TA402
Joshua Miller, Senior Threat Researcher on the APT team at Proofpoint discusses Palestinian-aligned threat group TA402. Joshua paints a vivid picture of TA402's usual targets, strategies, and tactics, highlighting its geofencing techniques and crafty use of compromised government agency accounts.
Nov 14, 2023
23:04
Unmasking the Tricksters: The World of Fake Browser Updates
How can you tell when a website (yes, a website) is compromised? Dusty Miller, a threat detection analyst at Proofpoint, dicusses four key groups that exploit trust in popular websites and how to avoid becoming the next victim.
Nov 3, 2023
31:42