3 Folgen

"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partners-in-crime, Dave Bittner and Rick Howard, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech professionals, providing security executives a clear and engaging “so what” that is actionable."

Only Malware in the Building DISCARDED | N2K Networks

    • Technologie

"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partners-in-crime, Dave Bittner and Rick Howard, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech professionals, providing security executives a clear and engaging “so what” that is actionable."

    Operation Endgame: The ultimate troll patrol.

    Operation Endgame: The ultimate troll patrol.

    Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
    Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "Operation Endgame."
    Operation Endgame is a strategy by Western law enforcement to counter Russian cybercriminals through psychological tactics. This involves creating distrust among hackers, exposing their internal communications, and dismantling their anonymity to hinder their operations. You can find more information on Operation Endgame here.
    Today we look at the new tactics used to disrupt these criminals by eroding trust among them and undermining their anonymity.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 30 Min.
    The curious case of the missing IcedID.

    The curious case of the missing IcedID.

    Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
    Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID."
    IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023.
    Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off.
    Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 21 Min.
    Trailer

    Trailer

    Trailer
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 1 Min.

Top‑Podcasts in Technologie

Flugforensik - Abstürze und ihre Geschichte
Flugforensik
Lex Fridman Podcast
Lex Fridman
Bits und so
Undsoversum GmbH
c’t uplink - der IT-Podcast aus Nerdistan
c’t Magazin
Dwarkesh Podcast
Dwarkesh Patel
Darknet Diaries
Jack Rhysider

Das gefällt dir vielleicht auch

DISCARDED: Tales From the Threat Research Trenches
Proofpoint
Threat Vector by Unit 42
Palo Alto Networks Unit 42 and N2K Networks
Microsoft Threat Intelligence Podcast
Microsoft
The Defender's Advantage Podcast
Mandiant
Caveat
N2K Networks
CyberWire Daily
N2K Networks