Building Capable Threat Intelligence Programs
It's possible to build effective cyber threat intelligence programs with smaller teams, but stakeholder buy-in is important. John Fokker of Trellix describes how security teams can improve their CTI programs.
Cybercrime Exposed Podcast: Botnet Breakup
The Qakbot or QBot botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforcement hacked the hackers. Here's the story.
Testing the Efficacy of Security Software
In this edition of Studio 471, Simon Edwards of SE Labs walks through how his company tests security products based on the cyber kill chain and MITRE ATT&CK.
Cybercrime Exposed Podcast: The Xbox One Hack
In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One.
Vulnerability Management and Patching: Outrunning Attackers
In this edition of Studio 471, Patrick Garrity of Nucleus Security shares the effects of the KEV list across the security industry, his research into the KEV, and how threat intelligence can guide patching efforts.
Cybercrime Exposed Podcast: Social Engineering
In this episode of Cybercrime Exposed, Bluma Janowitz, a social engineer and red team agent, describes two of her engagements to test an organization’s defenses against malicious hackers.
Mandiant’s CTO: A Bad Year for Ransomware and Extortion
In this edition of Studio 471, Mandiant CTO Charles Carmakal says half of all ransomware or extortion victims are paying ransoms. Sometimes, that is to prevent the release of sensitive data, while others pay to speed up recovery – even if the organizations have backups.
Cybercrime Exposed Podcast: The Extortionists
In one long weekend in May 2023, a cybercriminal gang called Clop conducted one of the largest data breaches on record.
Should Ransom Payments Be Made Illegal?
In this edition of Studio 471, Megan discusses the future of the Ransomware Task Force, whether ransom payments should be banned and how organizations are strengthening baseline security.
Cybercrime Exposed Podcast: The Phisherman
In this episode of Cybercrime Exposed, Bex Nitert, an incident response and forensics professional in Australia describes herself as a digital firefighter who helps organizations after they’ve been hacked. She often investigates phishing, the term for stealing login credentials with the aim of taking over accounts and systems.