74 episodes

Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world!

Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail or two!

The Out of the Woods cyber security podcast is filmed in front of a live studio audience, and by that we mean YOU! We're inviting folks to join us once a month for a LIVE evening of great technical discussions, where you can ask questions and give your opinion in real time on a variety of discussions about threat hunting, security research, blue teaming, and wherever else the evening takes us!

Out of the Woods: The Threat Hunting Podcast Out of the Woods: The Threat Hunting Podcast

    • Technology
    • 5.0 • 1 Rating

Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world!

Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail or two!

The Out of the Woods cyber security podcast is filmed in front of a live studio audience, and by that we mean YOU! We're inviting folks to join us once a month for a LIVE evening of great technical discussions, where you can ask questions and give your opinion in real time on a variety of discussions about threat hunting, security research, blue teaming, and wherever else the evening takes us!

    Top 5 Threat Hunting Headlines - 11 March 2024

    Top 5 Threat Hunting Headlines - 11 March 2024

    **Threat Hunting Workshop: Hunting for Initial Access
    March 20, 2024 | 12:00 - 1:00 PM ET
    More Details/ Registration 👇


    https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-10




    **[LIVE] Out of the Woods Podcast Episode
    April 4, 2024 | 7:00 - 8:30 PM ET
    More Details/Registration 👇
    https://info.cyborgsecurity.com/en-us/threathuntingpodcast-e15


    ----




    Top 5 Threat Hunting Headlines - 11 March 2024


    1. The Hacker News | Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets


    https://thehackernews.com/2024/03/microsoft-confirms-russian-hackers.html?m=1
    https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/

    2. Almond | UAC Bypass via Elevated .NET Applications 

    https://offsec.almond.consulting/UAC-bypass-dotnet.html
    3. Check Point Research | Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities 

    https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/?web_view=true
    4. https://www.nieuwsblad.be/cnt/dmf20240306_93861112

    5. Infosecurity Magazine | Dropbox Used to Steal Credentials and Bypass MFA in Novel Phishing Campaign

    https://www.infosecurity-magazine.com/news/dropbox-credentials-bypass-mfa/?&web_view=true
    -----

    Follow Us!




    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

    • 57 min
    Top 5 Threat Hunting Headlines - 04 March 2024

    Top 5 Threat Hunting Headlines - 04 March 2024

    **Threat Hunting Workshop: Hunting for Initial Access
    March 20, 2024 | 12:00 - 1:00 PM ET
    More Details/ Registration 👇


    https://info.cyborgsecurity.com/en-us/threat-hunting-workshop-10





    Top 5 Threat Hunting Headlines - 04 March 2024



    1. TrendMicro - Multistage RA World Ransomware Uses Anti-AV Tactics, Exploits GPO
    https://www.trendmicro.com/en_us/research/24/c/multistage-ra-world-ransomware.html?&web_view=true
    2. Help Net Security - Cybercriminals harness AI for new era of malware development
    https://www.helpnetsecurity.com/2024/03/01/hi-tech-crime-trends-2023-2024/?web_view=true
    3. Malware Bytes - Malicious meeting invite fix targets Mac users
    https://www.malwarebytes.com/blog/news/2024/03/malicious-meeting-invite-fix-targets-mac-users?&web_view=true
    4.  Security Affairs - A U.S. Court ordered surveillance firm NSO Group to hand over the source code for its Pegasus spyware and other products to Meta
    https://securityaffairs.com/159847/security/nso-group-vs-meta-pegasus-hand-over.html?web_view=true
    5. Security Affairs - U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft Streaming Service vulnerability to its Known Exploited Vulnerabilities catalog
    https://securityaffairs.com/159796/security/cisa-adds-microsoft-streaming-service-bug-known-exploited-vulnerabilities-catalog.html?web_view=true


    -----

    Follow Us!




    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

    • 29 min
    [LIVE] Out of the Woods: Episode 14

    [LIVE] Out of the Woods: Episode 14

    To be fully interactive by asking questions and giving feedback and opinions in real-time, join our Discord Server! Be sure to join the live recording of our next episode to be a part of the fun! --> https://discord.gg/sHw5c3qwRh

    ------------

    Follow Us!
    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    TikTok: https://www.tiktok.com/@cyborgsecinc

    • 1 hr 29 min
    Top 5 Threat Hunting Headlines - 26 Feb 2024

    Top 5 Threat Hunting Headlines - 26 Feb 2024

    Top 5 Threat Hunting Headlines - 26 February 2024



    1. The DFIR Report: SEO Poisoning to Domain Control: The Gootloader Saga Continues
    https://thedfirreport.com/2024/02/26/seo-poisoning-to-domain-control-the-gootloader-saga-continues/
    2. Cybersecurity & Infrastructure Security Agency: Updated: Top Cyber Actions for Securing Water Systems

    https://www.cisa.gov/news-events/alerts/2024/02/23/updated-top-cyber-actions-securing-water-systems
    https://www.cisa.gov/sites/default/files/2024-02/fact-sheet-top-cyber-actions-for-securing-water-systems.pdf

    3. The Hacker News: LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
    https://thehackernews.com/2024/02/lockbit-ransomware-group-resurfaces.html
    4. Group-IB: Extra Credit: VietCredCare Information Stealer Takes Aim at Vietnamese Businesses
    https://www.group-ib.com/blog/vietcredcare-stealer/
    5. Help Net Security: Cybersecurity Fears Drive a Return to On-Premise Infrastructure From Cloud Computing
    https://www.helpnetsecurity.com/2024/02/22/cloud-repatriation-projects-reasons/?web_view=true
    -----

    Follow Us!




    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity
    Discord: https://discord.gg/DR4mcW4zBr
    TikTok: https://www.tiktok.com/@cyborgsecinc

    • 1 hr 1 min
    Top 5 Threat Hunting Headlines - 05 Feb 2024

    Top 5 Threat Hunting Headlines - 05 Feb 2024

    Top 5 Threat Hunting Headlines - 05 February 2024


    1. Exploring the Latest Mispadu Stealer Variant


    https://unit42.paloaltonetworks.com/mispadu-infostealer-variant/?web_view=true
    2. Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours

    https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
    3. DDoS Attack Power Skyrockets to 1.6 Tbps

    https://www.helpnetsecurity.com/2024/02/02/ddos-attacks-h2-2023/?web_view=true
    4. Evolution of UNC4990: Uncovering USB Malware

    https://www.mandiant.com/resources/blog/unc4990-evolution-usb-malware
    5. Detecting and Mitigating a Phishing Threat: "Greatness"

    https://blog.sucuri.net/2024/02/detecting-and-mitigating-a-phishing-threat-greatness.html?web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity

    • 1 hr 5 min
    Top 5 Threat Hunting Headlines - 22 Jan 2024

    Top 5 Threat Hunting Headlines - 22 Jan 2024

    Top 5 Threat Hunting Headlines - 22 January 2024

    1. MavenGate Attack Could Let Hackers Hijack Java and Android via Abandoned Libraries



    https://thehackernews.com/2024/01/hackers-hijack-popular-java-and-android.html
    https://blog.oversecured.com/Introducing-MavenGate-a-supply-chain-attack-method-for-Java-and-Android-applications/#maven-philosophy

    2. North Korea's ScarCruft Attackers Gear Up to Target Cybersecurity Pros


    https://www.darkreading.com/threat-intelligence/north-koreasc-arcruft-attackers-target-cybersecurity-pros
    https://www.sentinelone.com/labs/a-glimpse-into-future-scarcruft-campaigns-attackers-gather-strategic-intelligence-and-target-cybersecurity-professionals/

    3. The Fake Fix: New Chae$ 4.1 Malware Hides in Driver Downloads

    https://www.hackread.com/fake-fix-chaes-4-1-malware-hides-driver-downloads/?web_view=true
    4. Outlook Vulnerability Discovery and New Ways to Leak NTLM Hashes

    https://www.varonis.com/blog/outlook-vulnerability-new-ways-to-leak-ntlm-hashes
    5. Bulletproof Hosting: A Critical Cybercriminal Service

    https://intel471.com/blog/bulletproof-hosting-a-critical-cybercriminal-service?&web_view=true
    -----

    Follow Us!

    Twitter: https://twitter.com/CyborgSecInc
    LinkedIn: https://www.linkedin.com/company/cyborg-security/
    YouTube: https://www.youtube.com/cyborgsecurity

    • 57 min

Customer Reviews

5.0 out of 5
1 Rating

1 Rating

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Hard Fork
The New York Times
The Gatekeepers
BBC Radio 4
Acquired
Ben Gilbert and David Rosenthal
Deep Questions with Cal Newport
Cal Newport

You Might Also Like

CyberWire Daily
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
Malicious Life
Malicious Life