
The Defender's Advantage Podcast (Mandiant)
Explore every episode of The Defender's Advantage Podcast
Pub. Date | Title | Duration | |
---|---|---|---|
10 Feb 2022 | Cyber Threats to the Olympics | 00:26:16 | |
In this episode, Mandiant Principal Analyst Cristiana Brafman Kittner joins host Luke McNamara to discuss the potential cyber threats to the 2022 Winter Olympic Games. The conversation delves into cyber incidents attached to previous games as well as what we could see this year at the games being held in Beijing. | |||
24 Feb 2022 | Left on Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity | 00:33:25 | |
In this episode, Ryan Tomcik, Emiel Haeghebaert, and Tufail Ahmed joins host Luke McNamara to discuss their blog post detailing their investigation on the activity of UNC3313. The group details the collaboration between their respective teams at Mandiant to detect and respond to an intrusion by the threat actor. Read their blog post, “Left on Read: Telegram Malware Spotted in Latest Iranian Cyber Espionage Activity,” at https://www.mandiant.com/resources/telegram-malware-iranian-espionage | |||
30 Mar 2022 | Welcome to the Defender's Advantage Podcast | 00:01:11 | |
Looking for Eye on Security? We are still here, but with a few important changes. Host Luke McNamara anchors our Threat Trends series, chatting with Mandiant intel analysts, consultants, and researchers, as well as external practitioners and leaders in cyber security, all through a threat-focused lens. Stay tuned for our inaugural Threat Trends episode later this week. | |||
01 Apr 2022 | Threat Trends: The Evolving Threat Landscape in Europe | 00:36:16 | |
This week, host Luke McNamara is joined by Jens Monrad, Director, EMEA, Mandiant Threat Intelligence. The two discuss the evolving threat landscape in Europe following the COVID-19 pandemic and touch on the cyber aspect of Russia’s invasion of Ukraine. You can follow Jens on Twitter at @jenschm. Don’t forget to rate, review, and subscribe on the platform where you listen to podcasts. | |||
15 Apr 2022 | Threat Trends: Breaking Down the 2022 M-Trends Report | 00:42:02 | |
It’s that time of year again: Mandiant has just published its M-Trends 2022 report. With almost 100 pages to unpack in this year’s report, host Luke McNamara is joined by Regina Elwell, Senior Principal Threat Analyst and Kirstie Failey, Senior Threat Analyst, who both contributed to the development of this year’s report. Among the aspects highlighted during the conversation are notable threat actors, including FIN12 and FIN13, the financially motivated threat groups that Mandiant graduated in 2021. The group also discussed the threat trends and techniques that have been observed during the report period. You can follow Regina Elwell at @ReginaElwell and Kirstie Failey at @Gigs_Security Download your copy of M-Trends 2022: https://www.mandiant.com/m-trends
Read how Mandiant tracks UNCs: https://mndt.info/3xwD9n3 Read this blog post to learn more about Cobalt Strike and BEACON: https://mndt.info/3Duxg9Q View this webinar to learn more about FIN12: https://mndt.info/38UyDVj Read this blog post to learn more about APT41: https://mndt.info/3JQOpgC
Don’t forget to rate, review, and subscribe where you listen to podcasts. | |||
02 May 2022 | Threat Trends: UNC3524 - Eye Spy on Your Email | 00:32:58 | |
In this week’s episode of The Defender’s Advantage Podcast, host Luke McNamara is joined by Doug Bienstock and Josh Madeley, members of the Mandiant consulting team to discuss a new threat actor, UNC3524. Doug and Josh share their observations of the group’s activities and tactics, like the use of IoT devices. Read more about UNC3524 in the team’s latest blog post, “UNC3524: Eye Spy on Your Email”: https://mndt.info/3KCGtQm Follow Doug Bienstock at @doughsec and Josh Madeley at @MadeleyJosh. Don’t forget to rate, review, and subscribe where you listen to podcasts. | |||
18 May 2022 | Threat Trends: Information Operations Surrounding the Russian Invasion of Ukraine | 00:45:04 | |
In this week’s Threat Trends episode of The Defender’s Advantage Podcast, host Luke McNamara is joined by Sam Riddell and Alden Wahlstrom, analysts on Mandiant’s IO team, to discuss what they are seeing in the cyber threat landscape around Russia’s invasion of Ukraine. They talk about what their team has observed in the lead up to the invasion and the activity they have seen in the IO space since. Sam and Alden dive in on the threat actors in the space, the tactics being employed, and where they see the activity moving as the conflict continues. Check out the blog, "Information Operations Surrounding the Russian Invasion of Ukraine" at https://mndt.info/3LumlAq. You can follow Sam Riddell at @RiddellSam and Alden Wahlstrom at @AldenWahlstrom. Don’t forget to rate, review, and subscribe where you listen to podcasts. | |||
26 May 2022 | Frontline Stories: OT/ICS Security | 00:28:52 | |
In the inaugural episode of the Frontline Stories series, part of The Defender’s Advantage Podcast, host Kerry Matre is joined by Rob Caldwell, Director of OT/ICS Services at Mandiant. During the conversation, they discuss OT/ICS security and the impact an OT attack can have on an organization. They also dive specifically into the INCONTROLLER and INDUSTROYER2 attacks and how they targeted OT environments. For more information on OT/ICS Security, visit https://mndt.info/3PF5JJD You can follow Rob Caldwell at @robac3. Don’t forget to rate, review, and subscribe where you listen to podcasts. | |||
02 Jun 2022 | Threat Trends: After the Headlines - Practical Experience of Rebuilding Trust After a Breach | 00:28:13 | |
In this week’s Threat Trends episode of The Defender’s Advantage Podcast, host Luke McNamara is joined by Jonathan Yaron, CEO and Chairman of Kiteworks to discuss navigating customer trust following a breach. During the conversation, Jonathan talks about lessons learned from the breach he led the company through and what leaders should consider in the event their organization experiences a breach. Don’t forget to rate, review, and subscribe where you listen to podcasts. | |||
06 Jun 2022 | Frontline Stories: Introducing Mandiant Digital Risk Protection | 00:34:12 | |
In this Frontline Stories episode of the Defender’s Advantage Podcast, host Kerry Matre is joined by Joshua Bass, Director of Product Management, and Sarah Korth, Director of Commercial Intel Services, to discuss Mandiant’s Digital Risk Protection (DRP) solution. The group discusses digital risk protection, what it can reveal about cyber threat profiles, and how attackers find weaknesses. They also discuss advancements made in digital threat management, a service included in our DRP solution, such as natural language processing. To learn more, read our blog, “Protecting Supply Chains and Third Party Vendor Connections" Don’t forget to rate, review, and subscribe where you listen to podcasts. Additional Resources Read more about Digital Risk Protection | |||
16 Jun 2022 | Threat Trends: Tracking Threat Actor Usage of Cryptocurrencies with Chainalysis | 00:43:11 | |
This week’s Threat Trends episode of The Defender’s Advantage Podcast features Jacqueline Koven, Head of Cyber Threat Intelligence at Chainalysis, who joined host Luke McNamara to discuss the trends in cryptocurrency and cyber activity. She also breaks down some examples of nation state usage and targeting of crypto and the adoption of cryptocurrency by different threat actors. Learn more about Chainalysis at chainalysis.com and follow them at @chainalysis. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
23 Jun 2022 | Skills Gap: Bridging the Skills Gap | 00:24:46 | |
This week’s episode of The Defender’s Advantage Podcast kicks off our new monthly series, Skills Gap, which focuses on thoughts, ideas, and initiatives for narrowing the skills gap in cyber security. Our host Chris Campbell was joined for this conversation by Mandiant’s John Doyle, Principal Consultant, and Matt Shelton, Director of Technology Risk and Threat Intelligence, to discuss talent and bridging the skills gap. The guests share their tips and resources for those interested in getting into the cyber security space and discuss what they look for when interviewing potential members of their teams. Follow John Doyle at @_John_Doyle and Matt Shelton at @mattjshelton. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast wherever you listen to podcasts! Additional Resources Read the blog, “Introducing the Mandiant Cyber Threat Intelligence (CTI) Analyst Core Competencies Framework”: https://mndt.info/3sQVU1g Learn more about Mandiant’s mWise Conference: https://mndt.info/3NeX7XQ Check out Mandiant’s career page to learn about employment opportunities: https://mndt.info/3NcOblJ | |||
30 Jun 2022 | Threat Trends: An Interview with the Danish Tech Ambassador | 00:38:27 | |
In this week’s episode of The Defender’s Advantage Podcast Threat Trends series, host Luke McNamara is joined by Anne Marie Engtoft Larsen to discuss her role as Danish Tech Ambassador and how the role has evolved since Denmark appointed the first Tech Ambassador in 2017. She chats about her views on cyber diplomacy and the value of partnerships with private sector cyber security companies. Ambassador Larsen also discusses the need for governments to tackle the issue of disinformation, talking specifically about the recent examples we’ve seen around COVID-19 and elections. Learn more about the Strategy for Denmark’s Tech Diplomacy 2021-2023 You can follow Ambassador Larsen at @TechambDK. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
07 Jul 2022 | Bonus: Securing OT/ICS Systems with Nozomi Networks | 00:24:21 | |
This special episode of The Defender’s Advantage Podcast features Mandiant CTO Marshall Heilman speaking with Edgard Capdevielle, CEO of Nozomi Networks. The conversation, recorded in-person at RSA Conference 2022, delves into the partnership between Mandiant and Nozomi, and how the organizations can take on escalating cyber risks to secure cyber-physical infrastructure. Marshall and Edgard discuss the trends they are seeing in the industrial and critical infrastructure space and the role of zero trust in how we secure modern day OT and ICS systems. You can learn more about Nozomi Networks at their website: https://www.nozominetworks.com/ Follow Nozomi Networks at @nozominetworks Additional Resources Learn more about the Mandiant Cyber Alliance Program: https://mndt.info/3xnXw5r | |||
14 Jul 2022 | Threat Trends: How Adversaries Are Leveraging AI in Cyber Operations | 00:32:28 | |
In this Threat Trends episode of The Defender’s Advantage Podcast, hear from Michelle Cantos who joins host Luke McNamara to discuss artificial intelligence (AI) in cyber and how adversaries are using AI in their activities today. Michelle details manipulated media techniques such as artificially generated images and vishing, tactics that have been increasingly employed by threat actors. She also discusses how financially motivated actors are seeking to leverage AI capabilities for extortive activity, and what we might expect to see as AI is further applied to cyber espionage operations. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
21 Jul 2022 | Skills Gap: Looking Beyond the Unicorn Candidate | 00:28:13 | |
All too often, hiring managers find themselves seeking candidates who fit 100% of the description for the role they are trying to fill. Because of this, they overlook a swath of applicants who are good for the job. In this week’s Skills Gap episode of The Defender’s Advantage Podcast, host Chris Campbell speaks with Mandiant consulting team members Dan Nutting, Kal Guntuku, and Chris Linklater about this habit and its contribution to the cyber security skills gap. The group also discusses the skills that companies could weigh outsourcing versus what skills they should consider keeping in-house. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast wherever you listen to podcasts! Additional Resources: Read tips from Mandiant's Kevin Bordlemay for candidates on how they can stand out during the application process in this Business Insider article: https://mndt.info/3Ohzezt | |||
28 Jul 2022 | Threat Trends: Securing the Vote in 2022 | 00:36:06 | |
In the latest Threat Trends episode of The Defender’s Advantage Podcast, Mandiant’s Jon Ford and Stacy O’Mara join host Luke McNamara for a conversation on election security. They discuss how organizations involved in the process of elections should think of cyber security in the lead up to these events, preparedness steps they have seen states take, and the evolution of the federal approach in the United States. Jon and Stacy also discuss some of the federal resources states and local entities can leverage for preparation going into the 2022 midterm elections and the 2024 general election in the U.S. Learn more about Mandiant’s expertise around election security at https://mndt.info/3zEzWCO Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
04 Aug 2022 | Frontline Stories: Shields Up, Mandiant | 00:36:18 | |
In this week’s episode of The Defender’s Advantage Podcast, Kerry Matre, host of the Frontline Stories series, is joined by Mandiant’s Tim Crothers and Matt Shelton who discuss their role in protecting the company from attackers. Both share their professional journeys, how changes at the company have impacted their responsibilities, and some standout moments they’ve experienced while safeguarding Mandiant, such as the SolarWinds attack campaign. Tim and Matt also detail how they continue to promote security awareness among employees and offer their insights on the steps security and non-security companies can take to ensure that their environments are secure against attackers. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts! | |||
11 Aug 2022 | Threat Trends: Building Cyber Resiliency Within Financial Services with FS-ISAC | 00:36:39 | |
In the latest Threat Trends episode of The Defender’s Advantage Podcast, host Luke McNamara is joined by Teresa Walsh, Global Head of Intelligence at the Financial Services Information Sharing and Analysis Center (FS-ISAC), for a deep dive on the financial services industry. Teresa discusses her journey from roles in government and how her experience has shaped her view of financial services. She also discusses how she sees the threat landscape impacting her customers and how FS-ISAC aids institutions in building resiliency against threats. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts! | |||
18 Aug 2022 | Skills Gap: Building a Successful Security Operations Team | 00:17:19 | |
The latest episode of the Skills Gap series, part of The Defender’s Advantage Podcast, features Mandiant Managed Defense team members Robert Parker and David Lindquist, who joined host Chris Campbell to discuss what they look for when hiring for their team. They detail the skills they look for most as they interview candidates and their tips for those looking to enhance their marketability in the industry. Robert and David also share instances in which they might shift their requirements of a potential candidate in favor of hiring someone with less experience and building them up. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. Additional Resources Read more about how Mandiant is helping to address the cyber security skills gap: https://mndt.info/3QyO9XL | |||
07 Sep 2022 | Threat Trends: APT42 - Crooked Charms, Cons, and Compromises | 00:50:58 | |
This week’s episode of The Defender’s Advantage Podcast features Emiel Haeghebaert and Ashley Zaya who joined Threat Trends series host Luke McNamara to discuss Mandiant’s most recently graduated APT group, APT42. Mandiant has identified APT42 as an Iranian-sponsored cyber espionage group tasked with conducting information collection and surveillance operations against individuals and organizations of strategic interest to the Iranian government. During the conversation, Emiel and Ashley dig into APT42’s activity and tactics, including spear-phishing and social engineering techniques. They also discuss where the group fits in to the threat landscape and how they see threat actor evolving. Read our blog post detailing our research on APT42: https://mndt.info/3R6Qs4z Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
01 Sep 2022 | Frontline Stories: Discussing the Impact of CISA KEV with Nucleus Security | 00:27:39 | |
This latest installment of the Frontline Stories series, part of The Defender’s Advantage Podcast, features Nucleus Security Co-Founder and CEO Stephen Carter, who joined our host Kerry Matre for a conversation on CISA KEV. CISA’s Known Exploited Vulnerabilities list prioritizes vulnerabilities the agency has determined to be exploited in the wild and mandates that specified U.S. civilian agencies patch the vulnerabilities by a specified deadline. Stephen and Kerry discuss how vulnerability management has evolved and how this effort from CISA helps U.S. civilian agencies as well as organizations globally. Follow Nucleus Security at https://nucleussec.com and follow at @nucleussec. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
15 Sep 2022 | Skills Gap: Expanding Diversity in Cyber Security | 00:37:40 | |
In this week’s episode of The Defender’s Advantage Podcast, Skills Gap series host Chris Campbell is joined by Dawn Hagen and Kevin Bordlemay for a discussion on diversity, inclusion, and belonging initiatives. The group discusses Mandiant’s internal focus on diversity, including employee resource groups, as well as efforts to build awareness of career paths in cyber security via middle school, high school, and college information sessions. They also discuss ways Mandiant is partnering with external organizations on initiatives to expand diversity in the broader industry, including the Elevate program and Mandiant Gives Back. Dawn and Kevin also dive in to the soft and technical skills applicants may be missing when interviewing for cyber security positions and the internal initiatives at Mandiant to address the skills gap. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. Additional Resources Learn about the Elevate program: https://mndt.info/3RQoMS6 Learn about Mandiant Gives Back: https://mndt.info/3EI7ErX Register for pre-conference training, provided by Mandiant Academy, ahead of mWISE Conference: https://mndt.info/3BIN0Id | |||
21 Sep 2022 | Threat Trends: The Security Landscape Facing Manufacturing | 00:37:35 | |
The latest episode in The Defender’s Advantage Podcast Threat Trends series features Todd Boppell, COO of the National Association of Manufacturers (NAM), who joined host Luke McNamara to discuss cyber security in the manufacturing landscape. During the conversation Todd shares the top concerns for NAM’s member organizations, how the industry approaches cyber security, and the challenges and opportunities he sees in the space. Learn more about NAM at https://www.nam.org and follow at @ShopFloorNAM Additional Resources Watch Mandiant’s recent manufacturing focused webinar on-demand now: https://mndt.info/3C1jKN5 Learn how Mandiant helps manufacturing organizations monitor, detect and respond to threats: https://mndt.info/3eZwoD0 | |||
29 Sep 2022 | Threat Trends: Metador, Mercenaries, and LABScon with SentinelOne | 00:40:48 | |
The latest episode of The Defender’s Advantage Podcast features SentinelOne researchers Tom Hegel and Juan Andres Guerrero-Saade who joined host Luke McNamara to discuss some of the latest research they presented at LABScon, September 20-24. Juan shares details around his team’s findings on Metador, a threat actor that primarily targets telecommunications and internet services providers, as well as universities in the Middle East and Africa. He discusses a few of the group’s unusual characteristics and also their awareness of operations security and deployment of countermeasures to thwart attribution efforts. Tom joins the discussion to give a glimpse of his LABScon presentation on the cyber mercenary group, Void Balaur. He details what they have seen in the group’s activity as well as what aspects he sees the group evolving in the landscape. Read more about the research on Metador: https://mndt.info/3UJ9XTf Read more about the research on Void Balaur: https://mndt.info/3SMsxYR You can follow Juan at @juanandres_gs and Tom at @TomHegel. Don’t forget to rate, review, and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. mWISE Conference is happening October 18-20. Register today: https://mndt.info/3rh3gdr | |||
06 Oct 2022 | Frontline Stories: The Evolution of the CISO | 00:32:02 | |
The latest episode of The Defender’s Advantage Podcast Frontline Stories series features Uplight CISO Alex Wood joining host Kerry Matre to discuss how his role has evolved over the course of his career, for example, changes in the CISO reporting structure and the role’s shift to encompass a business focus as opposed to being exclusively technical. He also discusses his own unique journey from majoring in chemistry to climbing the ranks in cyber security and his advice for those who want to break into the industry. Additionally, Kerry and Alex chat about Colorado = Security, a movement Alex co-founded to highlight the cyber security community in Colorado and bring those professionals in the area together through local events and a podcast. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
13 Oct 2022 | Threat Trends: The Threat Landscape in APJ | 00:22:01 | |
This week’s episode of The Defender’s Advantage Podcast, Mandiant’s Yihao Lim joins the Threat Trends series to chat with host Luke McNamara about the threat landscape in the Asia-Pacific region. Yihao discusses recent IO campaigns in the region, particularly DragonBridge and HaiEnergy, and how these attacks influence how organizations view disinformation campaigns in APJ. He also discusses the impact of geopolitical drivers, such as Russia’s invasion of Ukraine and tensions between China and Taiwan, impact the cyber security landscape in the region. Additionally, Yihao shares the trends that he sees in the threat landscape and how organizations in the region are approaching security. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
20 Oct 2022 | Skills Gap: More Than a Resume | 00:32:25 | |
On this week’s episode of The Defender’s Advantage Podcast, Skills Gap series host Chris Campbell is joined by Mandiant’s Fernando Tomlinson and Matt Boyle for a discussion on the value of hiring individuals from diverse professional backgrounds and ensuring accessibility to certifications and tools for those interested in transitioning to the cyber security field. Fernando and Matt share their thoughts on what hiring teams in the industry can do to learn more about an applicant’s analytical or soft skills outside of their resume. They also discuss the tools and resources that are available to foster greater diversity in the industry, which prospective candidates may not have immediate knowledge of, such as topical video libraries, SANS Cyber Immersion Academies and industry conferences. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
27 Oct 2022 | Threat Trends: Inside Google Cloud's Threat Horizons Report | 00:31:34 | |
This week’s episode of The Defender’s Advantage Podcast features Stan Trepetin, Technical Product Manager at Google Cloud, who joined Threat Trends host Luke McNamara to discuss the Threat Horizon’s Report produced by the Google Cybersecurity Action Team. Stan highlights several articles from the latest report in the quarterly series, including a piece on the importance of sharing information on state actor threats and vulnerabilities with the community to better protect your organization. He also details two of his own articles in the report, one on the issues that arise from improper cloud oversight and the other on malicious files and URLs slipping by IT governance controls. | |||
03 Nov 2022 | Skills Gap: Finding Your Fit in Cyber | 00:36:01 | |
On this week’s episode of The Defender’s Advantage Podcast, Mandiant’s Nader Zaveri and Simran Sakraney join Skills Gap host Chris Campbell for a discussion on how the cyber security industry and the companies within it can attract candidates from underrepresented groups and foster diversity. | |||
10 Nov 2022 | Threat Trends: Tracking DPRK Use of Cryptocurrencies | 00:36:58 | |
This week’s episode of The Defender’s Advantage Podcast features Mandiant’s Michael Barnhart and Joe Dobson who joined Threat Trends host Luke McNamara for a discussion on recent cyber activity out of North Korea, including the targeting of cryptocurrency. | |||
17 Nov 2022 | Frontline Stories: Cyber Insurance to Make Companies Safer | 00:30:09 | |
This week’s episode of The Defender’s Advantage Podcast features Davis Hake, co-founder of cyber insurance company Resilience, who joined Frontline Stories host Kerry Matre for a discussion on the role of cyber insurance. During the conversation, Davis explains the model for how cyber insurance is sold, the application process and how insurance companies work with clients to determine their risks and set rates. He also discusses some of the advances in recent years and those he hopes to see in cyber insurance in the coming years, including global resilience to digital threats. Learn more about Resilience at cyberresilience.com and follow at @ResilienceSays. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. Additional Resources | |||
23 Nov 2022 | Threat Trends: Reflections on Russian Cyber Threat Activity During the War in Ukraine | 00:43:54 | |
This week’s episode of The Defender’s Advantage Podcast features Mandiant analysts Gabby Roncone, John Wolfram and Tyler McLellan who joined Threat Trends host Luke McNamara for a discussion on Russian cyber operations over the last year. | |||
01 Dec 2022 | Skills Gap: Transitioning from Military Service to a Role in Cyber | 00:27:11 | |
This week’s episode of The Defender’s Advantage Podcast features four members of Team Mandiant who previously served in the United States military and transitioned into careers in the cyber security industry. Skills Gap host Kevin Bordlemay was joined by Paul Shaver, Thomas Worthington, Lauren Krukar, and Brian Timberlake for a discussion on what the transition out of service looks like and the resources that are available to those interested in a role in cyber. | |||
08 Dec 2022 | Frontline Stories: A Conversation on Third-Party Risk Management | 00:24:10 | |
This week’s episode of The Defender’s Advantage Podcast features British American Tobacco CISO, Dawn-Marie Hutchinson joins Frontline Stories host Kerry Matre for a discussion on third-party risk management. | |||
15 Dec 2022 | Threat Trends: A Year in Review with Sandra Joyce | 00:30:48 | |
This week’s episode of the Threat Trends series is the final episode of 2022 for The Defender’s Advantage Podcast. To wrap up our year and provide a glimpse into what we can expect from 2023, Sandra Joyce, VP of Mandiant Intelligence, joins host Luke McNamara for a discussion on some of the highlights from the past year. | |||
05 Jan 2023 | Frontline Stories: Get the Facts on Fraud | 00:23:43 | |
We are kicking off a new year of The Defender’s Advantage Podcast with a new episode of the Frontline Stories series. This week, host Kerry Matre is joined by Mary Writz, SVP of Product for fraud prevention platform Sift for a discussion on fraud. | |||
12 Jan 2023 | Skills Gap: Addressing the Cyber Mobilization Crisis | 00:23:35 | |
Our latest episode in The Defender’s Advantage Podcast Skills Gap series features Mandiant EVP and Chief of Business Operations Barbara Massa and Director of HR for Google Cloud Margaret Clarke who joined host Kevin Bordlemay to discuss the initiatives from Mandiant and Google Cloud to address the cyber mobilization crisis we are facing. Recent data shows that there are over 700,000 cybersecurity jobs that are unfilled in the US alone, and global estimates show this number is upwards of 3 million. Barbara and Margaret discuss how both Mandiant and Google Cloud are breaking down the barriers to employment in cyber and ensure those interested in employment get the education they need to be successful in the field. They also discuss how organizations should think differently about addressing the talent shortage in cyber security. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
19 Jan 2023 | Threat Trends: APT by USB | 00:28:20 | |
In this week’s episode of The Defender’s Advantage Podcast, Threat Trends host Luke McNamara is joined by Mandiant analysts Tyler McLellan and John Wolfram for a discussion on the usage of USB as an infection vector as described in two recent Mandiant blog posts. Don’t forget to rate, review and subscribe to The Defender’s Advantage Podcast where you listen to podcasts. | |||
10 Feb 2023 | Threat Trends: An Episode (Mostly) About Non-Ransomware Cyber Crime | 00:48:26 | |
Kimberly Goody and Jeremy Kennelly from Mandiant’s Financial Crime Analysis team join host Luke McNamara to discuss trends in the cyber crime landscape. Kimberly and Jeremy dive into the ongoing nature of banking malware repurposed for other types of financially-motivated crime, SIM swapping, experimentation with file types and post-compromise exploitation frameworks, and more. Of course, the discussion inevitably returns to the topic of extortion and ransomware, and where that might be heading next. | |||
23 Feb 2023 | Threat Trends: Head of TAG on Commercial Spyware, Cyber Activity in Eastern Europe and More | 00:25:19 | |
Shane Huntley, Senior Director of Google's Threat Analysis Group (TAG) joins host Luke McNamara to discuss his team's work keeping Google users secure. Shane breaks down the research his team has done on the problem of commercial spyware vendors, and how that is impacting the threat landscape today. While this threat has evolved over the years as vendors come and go, Shane highlights drivers to this market and how it may evolve in the years to come. Shane also delves into TAG's recent report on the past year of Russian cyber operations since the invasion of Ukraine, and provides some thoughts on threat activity to anticipate going forward, from supply chain compromises to election security. For more on TAG and Mandiant's analysis of Russian operations since the invasion of Ukraine, check out: https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/ For more on Google's efforts against commercial spyware: https://blog.google/threat-analysis-group/googles-efforts-to-identify-and-counter-spyware/ | |||
16 Feb 2023 | Frontline Stories: A CISO's Perspective on Managing a Breach | 00:32:41 | |
Have you ever wondered what a breach is really like from a CISO's perspective? | |||
20 Mar 2023 | Threat Trends: A Retrospective on Zero-Days in 2022 with Project Zero and Mandiant | 00:48:46 | |
Jared Semrau (Mandiant) and Maddie Stone (Project Zero) join host Luke McNamara for a look back at the zero-day exploit trends of 2022. Maddie and Jared break down the differences in focus between their teams, and some of the interesting things they each observed last year. Jared covers some of the threat actors that drove last year's trends in observed zero-days, and Maddie highlights how variants of known vulnerabilities and bugs continue to shape the exploit landscape. They also discuss the challenges and trade-offs for defenders that arise from publishing technical details of exploits. | |||
28 Mar 2023 | Threat Trends: How APT43 Targets Security Policy Experts Focused on North Korea | 00:39:17 | |
With the public release of Mandiant's latest named threat actor--APT43--guests Michael Barnhart and Jenny Town join host Luke McNamara to uncover how this espionage actor targets policy experts to support North Korea's nuclear ambitions. | |||
11 Apr 2023 | Frontline Stories: Exposure Management Beyond Vulnerabilities | 00:25:48 | |
Jonathan Cran, Lead for Mandiant Attack Surface Management at Google Cloud, joins host Kerry Matre to discuss the evolution of vulnerability and exposure management and how important comprehensive approaches are to mitigating cyber risk. | |||
24 Apr 2023 | Threat Trends: M-Trends 2023 | 00:40:40 | |
Mandiant's Kirstie Failey and Jake Nicastro join host Luke McNamara to break down the findings from the 2023 M-Trends report. Kirstie and Jake cover some of the notable trends gleaned from Mandiant breach investigations over the past year around dwell time, ransomware, top initial intrusion vectors, and more. | |||
09 May 2023 | Threat Trends: Bonus Episode - How Will AI Impact Threat Intelligence? | 00:09:22 | |
The endless battle of threat actors versus cybersecurity professionals may come down to who deploys AI better. In this interview from RSA, John Hultquist, Senior Manager, Mandiant Intelligence, surmises how the bad guys may use AI in the near future to scale attacks, while Vijay Ganti, Head of Product Management, Threat Intelligence, Detection & Analytics for Google Cloud Security, walks through the AI use cases that will help organizations better defend against those attacks. Hosted by Dan Lamorena, Head of Mandiant Product Marketing. | |||
17 May 2023 | Frontline Stories: The Executive's Role in Cybersecurity | 00:33:17 | |
What role do executives and the board play in cybersecurity and breach management. Hear from Jesse Jordan and Howard Israel of Mandiant discuss their experiences helping executives get the right information from their security leaders and understanding their role during a breach. | |||
26 May 2023 | Threat Trends: UNC961 and How Managed Defense Approaches Threat Hunting | 00:30:20 | |
Ryan Tomcik, Dan Fenwick, and Tim Martin join host Luke McNamara to discuss how Managed Defense conducts proactive hunting, illustrated by several UNC961 intrusions. | |||
06 Jun 2023 | Frontline Stories: Crisis Communications During a Breach | 00:31:26 | |
Dan Wire from Mandiant joins host Kerry Matre to discuss the ins and outs of crisis communications during a breach as well as what you can do to prepare for a crisis. | |||
16 Jun 2023 | Threat Trends: A Requirements-Driven Approach to Cyber Threat Intelligence | 00:27:39 | |
Dr. Jamie Collier (Senior Threat Intelligence Advisor, Mandiant) joins host Luke McNamara to discuss the recent white paper from Mandiant about developing a requirements-driven approach to intelligence, challenges organizations face in this area, and the importance of recurring stakeholder feedback to a well-functioing CTI team. | |||
20 Jul 2023 | Threat Trends: The Implications of the MOVEit Compromise | 00:27:51 | |
Charles Carmakal, CTO for Mandiant Consulting, joins host Luke McNamara to discuss the long tail impact of FIN11's compromise of the MOVEit file transfer solution. Charles breaks down some of the differences with this compromise in comparison to FIN11's previous operations, why the impact from this operation may impact organizations for some time, and what this spells for the changing landscape of multifaceted extortion. | |||
20 Sep 2023 | Threat Trends: Unraveling WyrmSpy and DragonEgg Mobile Malware with Lookout | 00:32:42 | |
Host Luke McNamara is joined by Kristina Balaam, Staff Threat Researcher at Lookout, to discuss her work attributing two new mobile malware families to APT41. | |||
19 Oct 2023 | Threat Trends: Addressing Risk in the Cloud with Wiz | 00:37:05 | |
Host Luke McNamara is joined by Amitai Cohen, Attack Vector Intel Lead at Wiz to discuss trends in cloud security, managing risk, and more. | |||
25 Oct 2023 | Threat Trends: DHS Secretary Alejandro Mayorkas in Conversation with Kevin Mandia | 00:20:44 | |
Host Luke McNamara is joined for this special episode highlighting October as Cybersecurity Awareness Month by Kevin Mandia and DHS Secretary Alejandro Mayorkas. Secretary Mayorkas and Kevin discuss the threat landscape, collaboration between the private sector and government, improving the talent gap in cyber, and ongoing DHS initiatives to foster greater cyber security. https://www.cisa.gov/securebydesign | |||
12 Dec 2023 | Threat Trends: Tales from the 2023 Trenches | 00:37:47 | |
Doug Bienstock and Josh Madelay, Regional Leads for Mandiant Consulting, join host Luke McNamara to walk through some of the trends they have witnessed responding to breaches in 2023. Josh and Doug cover what is happening with business email compromise (BEC), common initial infection vectors, social engineering tactics, and more. | |||
10 Jan 2024 | Threat Trends: Hacktivists' Continued Use of DDoS | 00:44:50 | |
For our first episode of 2024, host Luke McNamara is joined by Mandiant Senior Technical Director Jose Nazario and Principal Analysts Alden Wahlstrom and Josh Palatucci, to discuss the hacktivist DDoS activity they tracked over the last year. | |||
25 Jan 2024 | Is The CTI Lifecycle Due For An Update? | 00:28:08 | |
Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his blog on the CTI Process Hyperloop and applying threat intelligence to the needs of the security organization and larger enterprise. | |||
07 Feb 2024 | Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO | 00:44:27 | |
Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara to discuss their takeaways from the last year of threat activity witnessed by enterprises within healthcare and life sciences. They discuss applying threat intelligence to third-party risk management, threat modeling, and more. | |||
21 Feb 2024 | The North Korean IT Workers | 00:34:40 | |
Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic of Korea's (DPRK) usage of IT workers to gain access to enterprises. | |||
14 Mar 2024 | Director of NSA's Cybersecurity Collaboration Center on Trends in 2024 | 00:25:48 | |
Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon and other threat actors utilizing living off the land (LotL) techniques, zero-day exploitation trends, how the CCC works with private sector organizations, and more. | |||
29 Mar 2024 | Hunting for "Living off the Land" Activity | 00:42:32 | |
Host Luke McNamara is joined by Mandiant consultants Shanmukhanand Naikwade and Dan Nutting to discuss hunting for threat actors utilizing "living off the land" (LotL) techniques. They discuss how LotL techniques differ from traditional malware based attacks, ways to differentiate between normal and malicious use of utilities, Volt Typhoon, and more. | |||
11 Apr 2024 | Assessing the State of Multifaceted Extortion Operations | 00:40:54 | |
Kimberly Goody, Head of Mandiant's Cyber Crime Analysis team and Jeremy Kennelly, Lead Analyst of the same team join host Luke McNamara to breakdown the current state of ransomware and data theft extortion. Kimberly and Jeremy describe how 2023 differed from the activity they witnessed the year prior, and how changes in the makeup of various groups have played out in the threat landscape, why certain sectors see more targeting, and more. | |||
29 Apr 2024 | M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher | 00:25:53 | |
Jurgen Kutscher, Mandiant Vice President for Consulting, joins host Luke McNamara to discuss the findings of the M-Trends 2024 report. Jurgen shares his perspective on the "By the Numbers" data, the theme of evasion of detection in this year's report, and how Mandiant consultants have been leveraging AI in purple and red teaming operations. | |||
16 May 2024 | Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances | 00:27:47 | |
Mandiant Principal Analysts John Wolfram and Tyler McLellan join host Luke McNamara to discuss their research in the "Cutting Edge" blog series, a series of investigations into zero-day exploitation of Ivanti appliances. John and Tyler discuss the process of analyzing the initial exploitation, and the attribution challenges that emerged following the disclosure and widespread exploitation by a range of threat actors. They also discuss the role a suspected Volt Typhoon cluster played into the follow-on exploitation, and share their thoughts on what else we might see from China-nexus zero-day exploitation of edge infrastructure this year. | |||
22 May 2024 | The ORB Networks | 00:29:54 | |
Michael Raggi (Principal Analyst, Mandiant Intelligence) joins host Luke McNamara to discuss Mandiant's research into China-nexus threat actors using proxy networks known as “ORBs” (operational relay box networks). Michael discusses the anatomy and framework Mandiant developed to map out these proxy networks, how ORB networks like SPACEHOP are leveraged by China-nexus APTs, and what this all means for defenders. | |||
03 Jun 2024 | Lessons Learned from Responding to Cloud Compromises | 00:30:16 | |
Mandiant consultants Will Silverstone (Senior Consultant) and Omar ElAhdan (Principal Consultant) discuss their research into cloud compromise trends over 2023. They discuss living off the land techniques in the cloud, the concept of the extended cloud attack surface, how organizations can better secure their identities, third party cloud compromise trends, and more. | |||
27 Jun 2024 | Mandiant's Approach to Securely Using AI Solutions | 00:32:00 | |
Mandiant Consultants Trisha Alexander, Muhammed Muneer, and Pat McCoy join host Luke McNamara to discuss Mandiant's recently launched services for securing AI. They discuss how organizations can proactively approach securing the implementation of AI workloads, red-team and test these security controls protecting generative AI models in production, and then also employ AI within the security organization itself. | |||
25 Jul 2024 | What Iranian Threat Actors Have Been Up To This Year | 00:36:13 | |
Mandiant APT Researcher Ofir Rozmann joins host Luke McNamara to discuss some notable Iranian cyber espionage actors and what they have been up to in 2024. Ofir covers campaigns from suspected IRGC-nexus actors such as APT42 and APT35-related clusters, as well as activity from TEMP.Zagros. | |||
04 Sep 2024 | TAG's Work Tracking Commercial Surveillance Vendors | 00:23:58 | |
Host Luke McNamara is joined by Clement Lecigne, security researcher at Google's Threat Analysis Group (TAG) to discuss his work tracking commercial surveillance vendors (CSVs). Clement dives into the history and evolution of the CSV industry, how these entities carry out operations against platforms like mobile, and the nexus of this problem into the increasing rise of zero-day exploitation. | |||
26 Sep 2024 | How Threat Actors Bypass Multi-Factor Authentication | 00:27:20 | |
Josh Fleischer, Principal Security Analyst with Mandiant's Managed Defense organization sits down with host Luke McNamara to discuss trends in MFA bypass and how threat actors are conducting adversary in the middle (AiTM) attacks to gain access to targeted organizations. Josh walks through a case study of MFA bypass, how token theft occurs, the increasing amount of AiTM activity with more features being added to phishing kits, and more. | |||
04 Oct 2024 | Using LLMs to Analyze Windows Binaries | 00:36:40 | |
Vicente Diaz, Threat Intelligence Strategist at VirusTotal, joins host Luke McNamara to discuss his research into using LLMs to analyze malware. Vicente covers how he used Gemini to analyze various windows binaries, the use cases this could help address for security operations, technical challenges with de-obfuscation, and more. | |||
18 Oct 2024 | How to Run an Effective Tabletop Exercise | 00:29:14 | |
Mandiant Senior Consultant Alishia Hui joins host Luke McNamara to discuss all things tabletop exercise related. Alishia walks through the elements of a tabletop exercise, important preparatory steps, the success factors for a good exercise, and how organizations can implement lessons learned. | |||
02 Dec 2024 | The Art of Remediation in Incident Response | 00:40:59 | |
Jibran Ilyas (Consulting Leader, Mandiant Consulting) joins host Luke McNamara to discuss remediation as part of incident response. Jibran covers various scenarios (espionage and ransomware) and how they may differ in approaching remediation, how types of architecture could shape remediation efforts, non-technical components of the remediation phase, and more. | |||
05 Feb 2025 | Agentic AI in Cybersecurity | 00:26:40 | |
Steph Hay (Senior Director for Gemini Product and UX, Google Cloud Security) joins host Luke McNamara to discuss agentic AI and its implications for security disciplines. Steph walks through how generative AI is already impacting the finding of threats, reduction of toil, and the scaling up of workforce talent, before discussing how agents will increasingly play a role in operationalizing security. Steph details how this automation of processes, with humans in the loop, can increase the capabilities of an enterprise in cyber defense. | |||
19 Feb 2025 | Signals of Trouble | 00:26:03 | |
Dan Black (Principal Analyst, Google Threat Intelligence Group) joins host Luke McNamara to discuss the research into Russia-aligned threat actors seeking to compromise Signal Messenger. Dan lays out how this latest evolution of Russia's usage of cyber in Ukraine compares to previous phases of the conflict, how this activity is likely supporting battlefield operations, and how users of secure messaging applications can mitigate some of the risks associated with activity like this. https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger | |||
22 Apr 2021 | The Making of an M-Trends Report | 00:46:49 | |
Have you ever wondered what it takes to develop our annual M-Trends report? The short answer is: a whole lot! Our host Luke McNamara asked Regina Elwell, Senior Principal Threat Analyst on the Advanced Practices Team, and Steve Stone, Senior Director for Advanced Practices, to take us behind the scenes so we can see exactly what goes into building an edition of M-Trends. Steve started by discussing the sheer amount of data collection that is required, and how the team has to pore over this data—which comes directly from our incident response investigations—to determine what is a trend and what is not. Regina and Steve also touched on the evolution of the report from its first iteration in 2011. Not surprisingly, the reports have gotten more robust and include new data points almost every year. We also discussed some of the highlights from our latest report, M-Trends 2021, and interpreted some of the key findings, including drops in median dwell time, increases in internal detections, impact of ransomware, and notable malware families from 2020. Additionally, we covered some of the process and approach Mandiant puts into grouping new threat groups (UNCs) and Steve and Regina’s favorite threat actors. Listen to the podcast now, and when you’re done, read the full M-Trends 2021 report. | |||
28 Apr 2021 | Automated Defense Brings New Features to Mandiant Advantage | 00:28:08 | |
Mandiant Advantage, our SaaS platform, was always intended to house more than just our threat intelligence—and now it does. With the addition of Mandiant Automated Defense and Mandiant Security Validation, we are continuing to roll out new features in a platform that is easily accessible, as well as easy to deploy and scale. Mike Armistead, SVP of Mandiant Advantage Products, joined host Luke McNamara to discuss what security teams will be able to do with these new features. Mike joined FireEye during the Respond Software acquisition, in which Respond’s solution became what is now known as Mandiant Automated Defense. Mike shared how the addition of Mandiant Automated Defense to the Mandiant Advantage platform enables the automation of tier one triage alerts. One thing that really stuck out about their conversation is how weaving together Mandiant Automated Defense, Mandiant Security Validation, and Mandiant Threat Intelligence helps organizations prioritize threats that matter to them, fast. Listen to this episode to get a walkthrough of how a SOC analyst can use the Mandiant Advantage platform to access intel about an alert they receive. You’ll also get a glimpse into what’s next for the Mandiant Advantage platform. | |||
04 May 2021 | Pandemic Impacts to the Cyber Threat Landscape | 00:23:24 | |
In the latest episode of Eye on Security, we invited Jens Monrad, Head of Mandiant Threat Intelligence, EMEA to join Luke for a conversation on how the threat landscape has changed in the past year and how it continues to be impacted by the ongoing pandemic. We reviewed the cyber events of the past year: pandemic-themed phishing, multiple APT campaigns against vaccine research and development, and ransomware targeting healthcare systems. Jens revealed that the biggest change still impacting the cyber threat landscape is the sheer volume of people working from home. He also highlighted the potential increase in the cyber criminal ecosystem due to job losses, and how individuals might turn to cybercrime in order to make money. Check out the episode now to hear how the pandemic has impacted APT activity and disinformation campaigns. Jens also shares a unique piece of advice on the threat landscape that is helpful to remember as we all work to better secure our environments. For additional information on how the pandemic and more is influencing the cyber threat landscape, check out our latest M-Trends 2021 report.
| |||
19 May 2021 | How Mandiant is Helping Governments Build Cyber Capacity | 00:40:24 | |
Host Luke McNamara is joined by Paul Tumelty, Government Security Manager, to discuss how Mandiant is partnering with governments in EMEA to help foster cyber capacity building in nations across the region. | |||
10 Jun 2021 | Low Sophistication Threat Actors Continue to Target OT | 00:43:02 | |
On this episode we have Daniel Kappelman Zafra, a manager on Mandiant’s Cyber Physical Threat Intelligence team, to discuss a recent blog he and has team have released on the trend of lower sophistication threat actors targeting operational technology (OT). We discuss a precursor blog they put out last year, specific to this trend and the usage of ransomware by financially motivated actors to OT, and we talk about what Daniel is seeing change in this space. Our conversation touches on the various motivations that appear to be shaping this activity, and what it means for the potential proliferation of this as a tactic for hacktivists, opportunistic threat actors, and more. One of the things that I think really comes across in this episode is the thoughtful analysis that Daniel and his team apply to ascertaining the drivers of this trend and where it may be going. It’s an insightful look into an area of threat activity we will likely continue to see headlines around this year. | |||
15 Jun 2021 | Filling the CTI Skills Gap with Mandiant On-Demand Cyber Intelligence Training | 00:45:17 | |
In response to an increasing demand to fill the CTI skills gap, Mandiant has made a commitment to arm organizations around the world with skilled security teams to succeed on the fast-evolving threat landscape. Host Luke McNamara is joined by Shanyn Ronis, Manager, Intelligence Training Program to discuss the official launch of Mandiant On-Demand Cyber Intelligence Training. Backed by 15+ years of frontline expertise and accessible 24/7, this on-demand training provides a cost-effective approach that empowers cyber security teams to effectively use intelligence across different job roles, at different skill levels. | |||
13 Jul 2021 | Fostering CTI Development with Mandiant Intelligence Services | 00:36:46 | |
Host Luke McNamara is joined by Jeff Compton, Senior Manager for Mandiant’s Intelligence Capability Development team to discuss the focus of his team in helping customers build threat intelligence programs and how the needs of customers in this space continue to evolve, and how the regulatory landscape is driving change in particular regions and industries. One of the things that Jeff in particular highlighted is the importance of having a threat intel function that supports more than just the SOC, but broader stakeholders across the organization as well. Translating cyber threats into risk particular to the customer is a big focus of Jeff’s team, woven throughout their range of functions. | |||
30 Jul 2021 | Assessing Iranian Threat Actors’ Usage of Ransomware | 01:07:02 | |
While much of the discussion around modern ransomware campaigns has centered on threat actors from Eastern Europe and Russia, this episode highlights some of the lesser-known activity in a different region and explores how nations may experiment with asymmetric cyber capabilities in the future. In this episode of the Eye on Security podcast, host Luke McNamara sits down with Sanaz Yashar (Manager, Mandiant Intelligence) and Matan Mimran (Principal Analyst, Mandiant Intelligence) to discuss some of their research into Iranian threat actors leveraging ransomware and other cyber-crime tactics. Sanaz and Matan walk through campaigns they have witnessed from several UNCs that have impacted organizations in Israel and elsewhere, examining evidence for why these incidents could be part of a trend towards using ransomware for purposes other than financial gain. | |||
20 Aug 2021 | Tackling Supply Chain Security | 00:34:41 | |
Whether it’s shipping disruptions caused by the COVID-19 pandemic or compromises into software platforms used by hundreds of organizations, supply chain issues are back in the spotlight. In this episode of Eye on Security, host Luke McNamara is joined by Bryan Ware, CEO of Next5 and former Assistant Director of Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA). Bryan shares his perspective on the state of supply chain security, including the current challenges bringing this issue to the forefront now, different ways to think about supply chain issues, and steps organizations can take to mitigate their risk in this space. | |||
07 Sep 2021 | The Evolving Ransomware Landscape | 00:31:24 | |
This episode of Eye on Security delves into a security topic that continues to be front and center for many organizations: ransomware. Dave Wong, Vice President for Mandiant Consulting, joined host Luke McNamara to discuss some of the recent changes with threat activity in this space. Dave covered where the trends in ransomware operations have taken us over the last year and a half, with increasing ransom price demands and the frequent extortion over stolen data from the victim. Dave and Luke also chatted affiliate models common and the fluid nature of many ransomware families, as new malware emerges and others seemingly “go dark”. Dave discussed his visibility into ransomware negotiations, sharing examples of his experience in dealing with these threat actors. He also highlighted important preparedness steps organizations can take beyond technical hardening by considering strategies of how they might approach dealing with a threat actor in a ransomware scenario. Finally, Dave and Luke touched on what changes might be seen as threat actors continue to evolve TTPs and extortion methods. For further insights into ransomware negotiations, check out this Daily Beast interview with Dave: https://www.thedailybeast.com/inside-a-ransomware-negotiation-this-is-how-asshole-russian-hackers-keep-shaking-down-companies | |||
23 Sep 2021 | Disentangling the DPRK | 00:56:37 | |
Host Luke McNamara is joined by Eli Fox and Michael Barnhart, both Senior Analysts at Mandiant, to discuss some of their work tracking various North Korean threat clusters. Michael and Eli share their perspectives on the continuously changing landscape of DPRK threat actors, some of the challenges in tracking them, and how information from defectors augments the technical data in their analysis. They share several stories of recent campaigns and delve into where some of these threats may be headed next. | |||
07 Oct 2021 | The FIN12 Episode | 00:41:34 | |
For the launch of Mandiant’s most newly graduated threat group, FIN12, Kimberly Goody (Director, Financial Crime Analysis) and Josh Shilko (Principal Technical Analyst, Financial Crime Analysis) join Eye on Security to discuss this actor. They cover this group’s TTPs and targets, where they fit into the ransomware ecosystem, and what makes this particular threat actor unique in the landscape. | |||
15 Oct 2021 | Covering Cyber Threats and Trends | 00:45:32 | |
While the broader discussion of cyber-related incidents, events, and trends are contributed to by many different types of organizations and individuals, journalists play an important role in furthering our collective understanding of this space. Journalist Kim Zetter joins host Luke McNamara on Eye on Security to share her perspective in covering cybersecurity as a journalist. Kim discusses how the cybersecurity beat has evolved over the years, where she gathers information to write stories, and some of the themes she sees in the current conversation about cybersecurity issues. | |||
02 Nov 2021 | Analyzing Vulnerability and Exploitation Activity in 2021 | 00:49:29 | |
Jared Semrau and James Sadowski join host Luke McNamara to discuss some of their teams’ research this year into the rise of observed 0-days and other exploitation trends. They cover how the vulnerability landscape has evolved over the years, what has made 2021 stand out so far, and how the nature of threat activity—particularly the growth of ransomware—has shifted the makeup of actors in this space. For Mandiant Advantage users, please see related reporting mentioned in this episode: Patch Me If You Can: Analyzing Trends in Time to Exploit (Q1 2020 Through Q1 2021) Shut the Front Door: VPN Vulnerability Exploitation Trends, January 2019 – June 2021 | |||
11 Nov 2021 | Leveraging Military Experience in an InfoSec Career | 00:33:26 | |
Jake Knowlton, Andy Schmidt, and Paul Shaver join host Luke McNamara to discuss making the transition from the military to working in cyber security. Jake, Andy, and Paul share their perspectives and how they became involved in this field, some of the challenges veterans might face, and how veterans can position their prior experience for roles in infosec. For more on Mandiant’s partnership with VetSec, please see this blog post: https://www.mandiant.com/resources/mandiant-collaborating-with-vetsec-to-train-us-service-members-veterans | |||
01 Dec 2021 | Conflict and Escalation in Cyberspace | 00:41:26 | |
Columbia University researcher Jason Healey joins host Luke McNamara to discuss how cyber policy has evolved over the years, the dynamics of cyber conflict, and more. In particular, this conversation delves into the risks of escalation in a crisis, how norms may (and may not) shape such conflicts, and changing the role between defense and attack. | |||
15 Dec 2021 | A Year in Review with Kevin Mandia | 00:33:11 | |
For our last episode of the year, Mandiant CEO Kevin Mandia joins host Luke McNamara for a year in review of 2021. The discussion includes a look back at the SolarWinds incident one year later as well as look forward to 2022 with the three things that are top of his mind going into the New Year. Additionally, Kevin touches on the future of Mandiant and the Mandiant Advantage platform. | |||
27 Jan 2022 | The Role of Contractors in Cyber Operations | 00:59:45 | |
Host Luke McNamara is joined by Michelle Cantos, John Doyle, and James Sadowski to discuss the role of contractors in cyber network exploitation (CNE) and other cyber operations. For further reading on this topic for Mandiant Advantage and MA Free users, please see “She Doesn’t Even Go Here: The Role of Contractors in the Cyber Landscape” at https://advantage.mandiant.com/reports/21-00013849. Register today for Mandiant Threat Intelligence Free. | |||
17 Feb 2016 | FireEye Podcast: Signal to Noise | 00:09:34 | |
How do you weed through the noise to find the signal? In this latest | |||
27 Jan 2016 | Eye on Security: Good Enough Is Not Good Enough | 00:11:03 | |
12 Jan 2016 | Eye on Security: FireEye Solutions Integration | 00:05:23 | |
08 Mar 2016 | Eye on Security: M-Trends 2016 | 00:13:24 | |
Learn more about the latest trends in cyber and what you can do to | |||
17 Mar 2016 | Invotas and iSIGHT Partners Acquisition | 00:21:10 | |
Learn more about the newest members of the FireEye family from Paul | |||
24 Mar 2016 | Dropbox and Cloud Security | 00:10:33 | |
More and more companies are relying on the cloud for storage and |