DISCARDED: Tales From the Threat Research Trenches

DISCARDED: Tales From the Threat Research Trenches

0 episodes

DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.
Welcome to DISCARDED

Podcasts

Under Siege: How Hackers Exploit Cloud Vulnerabilities

Published: Oct. 15, 2024, 5:30 p.m.
Duration: 33 minutes 9 seconds

Listed in: Technology

Champagne Attack Chains on a Kool-Aid Budget

Published: Sept. 30, 2024, 8 a.m.
Duration: 33 minutes 39 seconds

Listed in: Technology

Guarding the Vote: Unmasking Cyber Threats in Election Season

Published: Sept. 17, 2024, 8 a.m.
Duration: 32 minutes 38 seconds

Listed in: Technology

Very Mindful, Very APT: Inside the Activity of Current Espionage Actors

Published: Sept. 4, 2024, 8 a.m.
Duration: 49 minutes 36 seconds

Listed in: Technology

Rebel Security Training: Cyber Lessons from A Galaxy Far, Far Away

Published: Aug. 20, 2024, 8 a.m.
Duration: 57 minutes 11 seconds

Listed in: Technology

The Art of Frustrating Hackers: Diving Into the DEaTH Cycle with Randy Pargman

Published: Aug. 6, 2024, 8 a.m.
Duration: 52 minutes 36 seconds

Listed in: Technology

The Hunt for Cyber Criminals: A Deep Dive with Wired's Andy Greenberg

Published: July 24, 2024, 3:46 p.m.
Duration: 55 minutes 37 seconds

Listed in: Technology

Have you heard: Only Malware in the Building?

Published: July 15, 2024, 1:36 p.m.
Duration: 3 minutes 10 seconds

Listed in: Technology

Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques

Published: July 9, 2024, 6:10 p.m.
Duration: 33 minutes 53 seconds

Listed in: Technology

Checkmate: Breaking Down Operation Endgame

Published: June 25, 2024, 5:56 p.m.
Duration: 46 minutes 57 seconds

Listed in: Technology

Hacking the Human Mind: How Cyber Attackers Exploit Our Brains

Published: June 11, 2024, 8 a.m.
Duration: 51 minutes 47 seconds

Listed in: Technology

Decrypting Cyber Threats: Tactics, Takedowns, and Resilience

Published: May 29, 2024, 8 a.m.
Duration: 43 minutes 30 seconds

Listed in: Technology

Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor

Published: April 2, 2024, 3:42 p.m.
Duration: 40 minutes 57 seconds

Listed in: Technology

A Trip Down Malware Lane: How Today's Hottest Malware Stacks Up Against Predecessors

Published: March 19, 2024, 8 a.m.
Duration: 56 minutes 22 seconds

Listed in: Technology

Hiding In Plain Sight: Unique Methods Of C2 From Infostealers

Published: March 5, 2024, 9 a.m.
Duration: 27 minutes 23 seconds

Listed in: Technology

From Attribution to Advancement: Red Canarys Katie Nickels Tackles CTIs Biggest Questions

Published: Feb. 20, 2024, 9 a.m.
Duration: 47 minutes 4 seconds

Listed in: Technology

Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone

Published: Feb. 6, 2024, 9 a.m.
Duration: 55 minutes 39 seconds

Listed in: Technology

Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024

Published: Jan. 23, 2024, 9 a.m.
Duration: 1 hour 6 minutes 17 seconds

Listed in: Technology

Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024

Published: Jan. 9, 2024, 9 a.m.
Duration: 45 minutes

Listed in: Technology

Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit

Published: Dec. 26, 2023, 9 a.m.
Duration: 1 hour 4 minutes 59 seconds

Listed in: Technology

I Know This Might Sound Crazy but Russias TA422 Blasted Lots of Exploits

Published: Dec. 12, 2023, 9 a.m.
Duration: 50 minutes 39 seconds

Listed in: Technology

MITRE ATT&CK Evolves with Cyber Threat Sophistication

Published: Nov. 29, 2023, 9 a.m.
Duration: 50 minutes 35 seconds

Listed in: Technology

Looking Behind the Curtain at the Palestinian-Aligned TA402

Published: Nov. 14, 2023, 9 a.m.
Duration: 23 minutes 4 seconds

Listed in: Technology

Unmasking the Tricksters: The World of Fake Browser Updates

Published: Oct. 31, 2023, 8 a.m.
Duration: 31 minutes 42 seconds

Listed in: Technology

Decoding the Malware Maze: Insights From a Threat Researcher

Published: Oct. 17, 2023, 8:30 a.m.
Duration: 33 minutes 46 seconds

Listed in: Technology

Obfuscated: Online Threats and the Visually Impaired

Published: Oct. 4, 2023, 8 a.m.
Duration: 28 minutes 44 seconds

Listed in: Technology

DISCARDED: Live with John Hultquist!

Published: Sept. 22, 2023, 8 a.m.
Duration: 30 minutes 55 seconds

Listed in: Technology

From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave

Published: Sept. 5, 2023, 2:10 p.m.
Duration: 28 minutes 57 seconds

Listed in: Technology

Everything Comes Back in Style: How Old TTPs are Remerging in China's E-Crime Ecosystem

Published: Aug. 22, 2023, 8 a.m.
Duration: 37 minutes 4 seconds

Listed in: Technology

It Works on My Machine: Why and How Engineering Skills Matter in Threat Research

Published: Aug. 8, 2023, 8 a.m.
Duration: 46 minutes 9 seconds

Listed in: Technology

An Apple a Day Won't Keep Iranian APT Away: How TA453 Targets Macs

Published: July 25, 2023, 8 a.m.
Duration: 35 minutes 38 seconds

Listed in: Technology

Threats and Risks in the Global South

Published: July 11, 2023, 8 a.m.
Duration: 43 minutes 24 seconds

Listed in: Technology

Weird & Wacky Researcher Summer: The Artifacts & Detections Edition

Published: June 27, 2023, 8 a.m.
Duration: 37 minutes 15 seconds

Listed in: Technology

It's Summertime: Whats the E-crime Vibe?

Published: June 14, 2023, 5:16 p.m.
Duration: 44 minutes 30 seconds

Listed in: Technology

When the Threat Profile is High: Protecting At-Risk Individuals Online

Published: May 30, 2023, 5:12 p.m.
Duration: 32 minutes 13 seconds

Listed in: Technology

The Spies and Stalkers of Surveillance Capitalism

Published: May 16, 2023, 2:45 p.m.
Duration: 37 minutes 14 seconds

Listed in: Technology

Beyond Banking: IcedID Gets Forked

Published: May 2, 2023, noon
Duration: 46 minutes 19 seconds

Listed in: Technology

Did I miss you in Orlando?: The Rise of SMS Phishing

Published: April 18, 2023, 7 a.m.
Duration: 27 minutes 32 seconds

Listed in: Technology

Staying Ahead of Cloud-Based Threats: Insights on today's threat landscape

Published: April 7, 2023, 5:18 p.m.
Duration: 30 minutes 52 seconds

Listed in: Technology

Cat-phishing Dogfighters

Published: March 21, 2023, 5:01 p.m.
Duration: 31 minutes 47 seconds

Listed in: Technology

Prank or Propaganda? TA499 Pesters Politics

Published: March 7, 2023, 7:57 p.m.
Duration: 39 minutes 14 seconds

Listed in: Technology

A Venture Mindset: North Korean Actors Go Beyond Espionage

Published: Feb. 21, 2023, 4:31 p.m.
Duration: 40 minutes 17 seconds

Listed in: Technology

Why Do We Click? Understanding the Psychology of Social Engineering

Published: Feb. 8, 2023, 2:35 p.m.
Duration: 58 minutes 45 seconds

Listed in: Technology

New Year, New Threats: Prepping for the 2023 Threat Landscape

Published: Jan. 24, 2023, 7:55 p.m.
Duration: 39 minutes 31 seconds

Listed in: Technology

Confidence, confusion, cashout: How pig butchering is blindsiding victims

Published: Jan. 10, 2023, 3:58 p.m.
Duration: 43 minutes 37 seconds

Listed in: Technology

Holiday Happy Hour: 12 Faves of Threat Research

Published: Dec. 28, 2022, 5:02 p.m.
Duration: 32 minutes 55 seconds

Listed in: Technology

AMA Answers From the Threat Research Trenches

Published: Dec. 13, 2022, 4:46 p.m.
Duration: 51 minutes 26 seconds

Listed in: Technology

The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox

Published: Nov. 29, 2022, 7:23 p.m.
Duration: 27 minutes 8 seconds

Listed in: Technology

Machine Learning Is a Party With Camp Disco!

Published: Nov. 9, 2022, 12:04 a.m.
Duration: 39 minutes 50 seconds

Listed in: Technology

Reservation Confirmed: Threat Actors Visiting the Hospitality World

Published: Oct. 25, 2022, 3:47 p.m.
Duration: 39 minutes 1 second

Listed in: Technology

The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo

Published: Oct. 11, 2022, 7:16 p.m.
Duration: 35 minutes 18 seconds

Listed in: Technology

Investigating Wine Fraud with the Ransomware Sommelier

Published: Sept. 27, 2022, 2:53 p.m.
Duration: 49 minutes 54 seconds

Listed in: Technology

Hot off the Press: APT Actors Posing as Journalists

Published: Sept. 13, 2022, 4:38 p.m.
Duration: 30 minutes 31 seconds

Listed in: Technology

Misfits Managed: Breaking Down Misfit Malware

Published: Aug. 23, 2022, 3 p.m.
Duration: 36 minutes 42 seconds

Listed in: Technology

The Art of Threat Detection Engineering

Published: Aug. 9, 2022, 5:19 p.m.
Duration: 30 minutes 23 seconds

Listed in: Technology

APT Attribution: Trials and Tribulations From the Field

Published: July 26, 2022, 9:44 p.m.
Duration: 31 minutes 17 seconds

Listed in: Technology

The Dark-Side of Cryptocurrency

Published: July 12, 2022, 2:21 p.m.
Duration: 34 minutes 55 seconds

Listed in: Technology

A Day in the Life of a Threat Researcher: Emerging Threats Edition

Published: June 21, 2022, 7:24 p.m.
Duration: 33 minutes 25 seconds

Listed in: Technology

The Buzz on Bumblebee Malware

Published: June 7, 2022, 6:15 p.m.
Duration: 30 minutes 19 seconds

Listed in: Technology

Social Engineering: How Threat Actors Manipulate Their Targets

Published: May 24, 2022, 9:15 p.m.
Duration: 31 minutes 49 seconds

Listed in: Technology

Paying Attention to BEC: The Most Costly Threat by Individual Losses

Published: May 10, 2022, 6 p.m.
Duration: 39 minutes 1 second

Listed in: Technology

Web Bugs & the Tubthumping Tactics of Chinese Threat Actor TA416

Published: April 26, 2022, 6 a.m.
Duration: 36 minutes 8 seconds

Listed in: Technology

Defending Against Cyber Criminals: Emotets Resurrection & Contis Implosion

Published: April 12, 2022, 8:30 a.m.
Duration: 27 minutes 33 seconds

Listed in: Technology

Threat Actor 2541: The Latest Tricks & Patterns

Published: March 29, 2022, 10 a.m.
Duration: 23 minutes 28 seconds

Listed in: Technology

The Troubling Rise of MFA Kits

Published: March 15, 2022, 10:53 p.m.
Duration: 29 minutes 20 seconds

Listed in: Technology

Discussing RTF Template Injection: A Malicious Phishing Attempt

Published: March 2, 2022, 7:07 p.m.
Duration: 25 minutes 52 seconds

Listed in: Technology