DISCARDED: Tales From the Threat Research Trenches
Technology Podcasts
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.
Welcome to DISCARDED
Location:
United States
Genres:
Technology Podcasts
Description:
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
Language:
English
New Year, New Threats: Prepping for the 2023 Threat Landscape
Duration:00:39:31
Confidence, confusion, cashout: How pig butchering is blindsiding victims
Duration:00:35:13
Holiday Happy Hour: 12 Faves of Threat Research
Duration:00:32:48
AMA Answers From the Threat Research Trenches
Duration:00:51:22
The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox
Duration:00:27:07
Machine Learning Is a Party With Camp Disco!
Duration:00:39:40
Reservation Confirmed: Threat Actors Visiting the Hospitality World
Duration:00:39:00
The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo
Duration:00:35:17
Investigating Wine Fraud with the Ransomware Sommelier
Duration:00:49:49
Hot off the Press: APT Actors Posing as Journalists
Duration:00:30:28
Misfits Managed: Breaking Down Misfit Malware
Duration:00:36:37
The Art of Threat Detection Engineering
Duration:00:30:21
APT Attribution: Trials and Tribulations From the Field
Duration:00:31:14
The Dark-Side of Cryptocurrency
Duration:00:34:50
A Day in the Life of a Threat Researcher: Emerging Threats Edition
Duration:00:33:23
The Buzz on Bumblebee Malware
Duration:00:30:16
Social Engineering: How Threat Actors Manipulate Their Targets
Duration:00:31:48
Paying Attention to BEC: The Most Costly Threat by Individual Losses
Duration:00:38:55
Web Bugs & the Tubthumping Tactics of Chinese Threat Actor TA416
Duration:00:36:03
Defending Against Cyber Criminals: Emotet’s Resurrection & Conti’s Implosion
Duration:00:27:30