Ranked #1
Information operations during a war.
Information operations during a war.
Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis ... Read more
9 Jul 2022
•
20mins
Ranked #2
Could REvil have a copycat?
Could REvil have a copycat?
Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research... Read more
2 Jul 2022
•
16mins
Ranked #3
Lazarus Targets Chemical Sector With 'Dream Job.'
Lazarus Targets Chemical Sector With 'Dream Job.'
Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Target... Read more
25 Jun 2022
•
22mins
Ranked #4
Dissecting the Spring4Shell vulnerability.
Dissecting the Spring4Shell vulnerability.
Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analy... Read more
18 Jun 2022
•
23mins
Ranked #5
New developments in the WSL attack.
New developments in the WSL attack.
Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since Se... Read more
11 Jun 2022
•
23mins
Ranked #6
LemonDucks evading detection.
LemonDucks evading detection.
Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Crypto... Read more
4 Jun 2022
•
16mins
Ranked #7
Compromised military tech?
Compromised military tech?
Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spyin... Read more
28 May 2022
•
20mins
Ranked #8
AutoWarp bug leads to Automation headaches.
AutoWarp bug leads to Automation headaches.
Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation serv... Read more
21 May 2022
•
19mins
Ranked #9
Vulnerabilities in IoT devices.
Vulnerabilities in IoT devices.
Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 4... Read more
14 May 2022
•
23mins
Ranked #10
Vulnerabilities bring in the hackers.
Vulnerabilities bring in the hackers.
Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attac... Read more
7 May 2022
•
17mins