The Gate 15 Podcast Channel

Gate 15

The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.

  1. 2D AGO

    The Gate 15 Interview EP 69: Hank Teran on info ops, extremism, AI threats and challenges and the amazing New York City!

    In this episode of The Gate 15 Interview, Andy Jabbour speaks with Hank Teran. Hank is the CEO of Open Measures, an open source social intelligence platform built to help researchers identify online threats like disinformation and extremism to mitigate offline harms. Open Measures covers a wide range of social media platforms from mainstream to fringe, with a unique focus on emerging - or alternative - platforms. In the past Open Measures has been used in investigations on a range of topics including Russian information operations in the Sahel, AI deepfakes targeting celebrities and athletes, and the proliferation of stolen logs sales across channel-based messaging apps. Before building Open Measures, Hank led business development and operations teams across industries including M&A, rideshare, and software security & management. Throughout his career he’s been driven by a desire to create meaningful ownership opportunities for workers, both on the cap table and in the workplace. Hank and his team at Open Measures are based in NYC. When he’s not busy helping teams identify online threats, he can be found working on the Sunday crossword or researching the best nearby diner options. Hank on LinkedIn Hank in Politico, “The limits of making social media political,” 29 Jan 2026⁠ Open MeasuresOpen Measures NewsletterIn the podcast the team and Andy discuss: Hank, Open Measures and info ops.Threats, extremism and the impacts of AI.The importance of having a “human in the lead framework.”Why organizations need to prioritize visibility.Emerging challenges and the normalization of AI-generated content.We play 3 Questions! and discuss New York City, food, culture, Tom's Diner by Suzanne Vega and is this the same Tom’s Diner Hank is telling us about?!Hank closes us out noting, “This work is a marathon, not a sprint” and discussing the importance of mental health.And more! Open Measure links that may be of interest: Michigan-specific election conspiracy theoriesSmear campaign directed at CAIRNGOs targeted as "Antifa" Cracker Barrel CEO targeted amidst rebrandAE Good Jeans Ad sparks inauthentic backlashNeo-Nazi Active Clubs youth recruitmentAnti-abortion activism that puts clinics and practitioners at risk

    34 min
  2. Weekly Security Sprint EP 152. Information sharing, new cyber reporting, and weather!

    APR 1

    Weekly Security Sprint EP 152. Information sharing, new cyber reporting, and weather!

    In this week's Security Sprint, Dave and Andy covered the following topics: Opening: • Senate confirms Markwayne Mullin to lead Homeland Security as TSA standoff deepens • Auto-ISAC 2025 Annual Report — Auto-ISAC • ISACs confront AI’s promise and peril for threat intelligence-sharing — Cybersecurity Dive Podcast: What healthcare leaders face after a cyberattack — Health-ISAC • New Jersey Sign-Ups for MS-ISAC Remain Low Amid Attacks Main Topics: Cybersecurity Reports, Ransomware & Resilience • M-Trends 2026 — Google Cloud Mandiant — 24 Mar 2026. The PDF version of M-Trends 2026 shows that high tech was the most targeted industry in 2025 at 17 percent of investigations, followed by financial services at 14.6 percent, business and professional services at 13.3 percent, and healthcare at 11.9 percent. It also shows voice phishing at 11 percent of initial intrusion vectors and says ransomware appeared in 13 percent of incidents that Mandiant investigated in 2025. • M-Trends 2026 Report — Google Cloud • M-Trends 2026 reveals threat landscape shaped by faster, coordinated, and industrialized cyberattacks • High-Tech Sector Overtakes Finance as Top Target of Cyber-Attacks in 2025 • The phone call is the new phishing email • M-Trends 2026: Initial Access Handoff Shrinks From Hours to 22 Seconds • Top 50 Cybersecurity Threats — Splunk • If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident. • Iran-Linked Pay2Key Ransomware Group Re-Emerges • Waterfall Threat Report 2026 finds ransomware slowdown masks deeper shift toward nation-state attacks on critical infrastructure Atlantic hurricane season forecast 2026: 11-16 named storms predicted by AccuWeather — AccuWeather — 25 Mar 2026. AccuWeather forecasts a near-average Atlantic hurricane season with 11 to 16 named storms and several potential hurricanes. Target is coastal communities, emergency planners, and critical infrastructure operators preparing for seasonal storm impacts. Dig is that even an average season can produce high-impact storms that stress preparedness and response capabilities. The outlook is significant for planning purposes as organizations begin to align resources and contingency plans ahead of peak hurricane activity. • Ready.gov Quick Hits: • Treasury asks whether terrorism risk insurance program should bolster cyber coverage — CyberScoop | 25 Mar 2026. Treasury is seeking public comment for a report to Congress on the effectiveness of the Terrorism Risk Insurance Program and specifically asked whether changes should better address cyber related losses arising from acts of terrorism. The notice highlights a persistent gap because even catastrophic cyber incidents may fall outside the program unless Treasury certifies them as terrorism under current law. Target: insurers, critical infrastructure operators, large enterprises, and policymakers evaluating how to manage systemic cyber loss from high consequence attacks. Dig: this is an important resilience and policy signal because it could shape future federal backstop discussions for cyber insurance ahead of the law’s scheduled 2027 expiration. (CyberScoop)

    21 min
  3. Weekly Security Sprint EP 151. Traveling man, the return of the Weatherman, and threat reports

    MAR 24

    Weekly Security Sprint EP 151. Traveling man, the return of the Weatherman, and threat reports

    On this week's Security Sprint, Dave and Andy covered the following topics: Opening: • President Donald J. Trump Unveils National AI Legislative Framework - The White House • Emerging Attack Vectors: AI Agents & Prompt Injection Gate 15 | 16 Mar 2026 • The AI Landscape in Cybersecurity • An AI cyberattack could trigger a satellite apocalypse in the next 2 years. Are we prepared? • WaterISAC & EPA National Security Information Sharing Bulletin – Q1 2026 WaterISAC • Food and Ag-ISAC finds 72 active threat actors behind persistent, sophisticated cyber attacks targeting food supply chains • The E-ISAC's 2025 Report: Real Progress, Remaining Constraints Main Topics: Severe Weather • Spring outlook: Drought forecasted to expand in U.S. West, parts of Plains — NOAA | 21 Mar 2026 • Get Ready for a Year of Chaotic Weather in the US — Wired, 19 Mar 2026 2026 Annual Threat Assessment of the U.S. Intelligence Community — Office of the Director of National Intelligence, 18 Mar 2026. The ODNI released its 2026 Annual Threat Assessment outlining key threats including China’s cyber and military expansion, Russia’s hybrid operations, Iran’s regional aggression, and persistent cyber threats from nation-state and criminal actors. The report underscores increasing convergence between cyber operations, information operations, and physical-world impacts across critical infrastructure sectors. Islamic State group activity in the US in 2025 Institute for Strategic Dialogue | 11 Mar 2026. ISD assesses that Islamic State inspired activity in the United States remained persistent in 2025, with two successful attacks, five disrupted plots, and six material support arrests, and says most cases involved teenagers. The dispatch highlights continued use of firearms, explosive devices, vehicle attacks, and newer surveillance tools such as Meta glasses and drones during pre attack planning. It also notes that targets varied widely, including public celebrations, military interests, nightlife venues, law enforcement, schools, and religious institutions, which complicates protective prioritization. Quick Hits: • Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets — FBI IC3 • CISA Urges Endpoint Management System Hardening After Cyberattack Against U.S. Organization • CISA and FBI Release Public Service Announcement About Russian Intelligence Services Targeting Commercial Messaging Apps • Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape — Google Cloud Blog • Ransomware Spotlight: Agenda • Amazon Threat Intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls • Hastalamuerte and Gentlemen RaaS: Analyzing TTPs of a Growing Ransomware Threat • Beast ransomware server toolkit analysis • Beast ransomware’s toolkit revealed by exposed directory • Marquis ransomware gang stole data of 672,000 people in 2025 cyberattack • ESET Research: A Deep Dive into EDR Killers - a Cornerstone of Modern Ransomware Operations • Ransomware Affiliate ‘Gentlemen’ Emerges as Key Player • LeakNet Ransomware: What You Need to Know

    18 min
  4. Weekly Security Sprint EP 150. Saying it out loud - talking about Geo-political events and more PSAs

    MAR 18

    Weekly Security Sprint EP 150. Saying it out loud - talking about Geo-political events and more PSAs

    In this week's Security Sprint, Dave is solo and covered the following topics: Opening: • Business Continuity & Resilience: AI’s Double-Edged Impact — Gate 15 — 10 Mar 2026 — The article examines how artificial intelligence is reshaping business continuity and resilience planning across organizations. • Joint Advisory: Middle East Conflict and Critical Infrastructure — Gate 15 — 11 Mar 2026. On 11 March 2026, ten Information Sharing and Analysis Centers (ISACs) joined together to release a joint advisory on the Middle East conflict and the ongoing security implications to critical infrastructure. • U.S.: Why now: Cyber policy veterans weigh in on pivotal moment in evolution of security strategy — Inside Cybersecurity — 12 Mar 2026 Cyber policy veterans told Inside Cybersecurity that the United States has reached a pivotal moment in reshaping national cyber strategy as the Trump administration promotes a more aggressive model built around offensive and defensive capabilities, emerging technology, and reduced regulation. Main Topics: Operation Epic Fury & Related: • Iran’s threat on U.S. soil: sleeper cells, lone wolves and cyberattacks — Los Angeles Times — 10 Mar 2026 U.S. security officials warn that Iran could attempt retaliation through sleeper cells, lone wolf actors, or cyber operations targeting American interests if regional conflict escalates. • DOGE government spending cuts complicate US response to Iran cyber threats — CNN — 10 Mar 2026 —— Reporting describes how federal government restructuring and spending cuts tied to the Department of Government Efficiency have disrupted cyber coordination during heightened tensions with Iran. • How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks — WIRED — 12 Mar 2026 WIRED reports that Handala has become the most visible face of Iran’s retaliatory cyber campaign after the destructive breach of medical technology firm Stryker. • Iranian Hacktivists Strike Medical Device Maker Stryker in Severe Attack That Wiped Systems — Zetter Zero Day — 11 Mar 2026 Iranian hacktivist group Handala claimed responsibility for a destructive cyberattack that wiped systems belonging to medical device manufacturer Stryker. Michigan Synagogue Attack: • Michigan synagogue attack: FBI investigating as ‘targeted act of violence’ Bridge Michigan | 12 Mar 2026. Target: Temple Israel in West Bloomfield and the broader Jewish community in the Detroit area. ODU Attack: • FBI releases more details in deadly Virginia shooting — Post and Courier — 14 Mar 2026. Federal investigators released additional information about a deadly shooting in Virginia that left multiple people dead and triggered a large law enforcement response. Cyber Threats: • INTERPOL report warns of increasingly sophisticated global financial fraud threat — INTERPOL — 16 Mar 2026. INTERPOL released a report warning that global financial fraud schemes are becoming more complex and technologically enabled. • Public Service Announcement: Criminals Use Stolen Personal Information to Target Victims Through Government Impersonation Schemes — FBI Internet Crime Complaint Center — 09 Mar 2026 Ransomware: • Industrial Ransomware Analysis: Q4 2025 — Dragos — 11 Mar 2026 — Dragos reported that ransomware groups continue to target industrial organizations and operational technology environments, with manufacturing and industrial sectors representing a significant portion of victims. • France’s ANSSI warns ransomware gangs shifting tactics amid surge in attacks — Infosecurity Magazine — 11 Mar 2026 France’s national cybersecurity agency ANSSI warned that ransomware groups are adapting their tactics as attacks continue to increase across multiple sectors.

    15 min
  5. Weekly Security Sprint EP 149. ISAC/ISAO love, Iran, AI and a new cyber strategy

    MAR 10

    Weekly Security Sprint EP 149. ISAC/ISAO love, Iran, AI and a new cyber strategy

    In this week's Security Sprint, Dave and Andy covered the following topics: Opening: • Insider Threat: AI-equipped Employees - Gate 15 - 04 Mar 2026 • Communication and Collaboration Key Themes in GridEx VIII Lessons Learned Report • Health-ISAC Annual Report 2025 Shows Surge in Threat Intel and Tabletop Drills, Putting Resilience in Focus • The Gate 15 Special Edition: Iran, ISACs, & insomnia: What’s happening, and not happening, in information sharing — Gate 15 | 06 Mar 2026 • White House Unveils President Trump’s Cyber Strategy for America — The White House | 06 Mar 2026 o Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House o Ranking Member Thompson Statement on Trump’s 3-Page Cyber Strategy — Democrats on the House Homeland Security Committee, 06 Mar 2026 • Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens — The White House | 06 Mar 2026 Main Topics: Operation Epic Fury & Related: • White House blocks intelligence report warning of rising US homeland terror threat linked to Iran war • Iran may be activating sleeper cells in the United States, officials warn • Cyber threat bulletin: Iranian cyber threat response to US–Israel strikes February 2026, Canadian Centre for Cyber Security, 03 Mar 2026 • Alert: NCSC advises UK organisations to take action following conflict in the Middle East, NCSC, 02 Mar 2026 • U.S. threat intelligence units identify hacktivists as prime cyber vector in Iran conflict • Iran-linked hacktivists could target US state and local targets, experts warn • Trump Says ‘I Guess’ Americans Should Worry About Iran Attacks Cyber Reports • NCC Group Annual Threat Monitor Review of 2025 NCC Group, 05 Mar 2026 • Patch, track, repeat: The 2025 CVE retrospective — Cisco Talos, 05 Mar 2026 • Look What You Made Us Patch: 2025 Zero-Days in Review Google Cloud Blog, 05 Mar 2026 • Coalition report finds sharp rise in ransomware demands as most businesses refuse to pay — Reinsurance News | 07 Mar 2026 • INC Ransom Affiliate Model Enabling Targeting of Critical Networks Australian Cyber Security Centre, 05 Mar 2026 Quick Hits: • Top 10 artificial intelligence security actions: A primer Canadian Centre for Cyber Security, 05 Mar 2026 • Artificial Intelligence and Machine Learning Supply Chain Risks and Mitigations Australian Signals Directorate, 04 Mar 2026 • How AI Assistants Are Moving the Security Goalposts — Krebs on Security | 07 Mar 2026 • Preparation hardening destructive attacks — Google Cloud Threat Intelligence | 08 Mar 2026 • Tornadoes kill 6 people in Michigan and Oklahoma as powerful storms hit nation’s midsection

    21 min

Ratings & Reviews

5
out of 5
4 Ratings

About

The Gate 15 Company is a leader in helping organizations by providing threat-informed, risk-based approaches to analysis, preparedness and operations.

You Might Also Like