15 min listen
166 Inside the Adversary Exploit Process
166 Inside the Adversary Exploit Process
ratings:
Length:
19 minutes
Released:
Jul 13, 2020
Format:
Podcast episode
Description
With thousands of vulnerabilities reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is that less sophisticated threat actors often resort to using older vulnerabilities with easily accessible resources and tutorials.
Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.
Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.
Released:
Jul 13, 2020
Format:
Podcast episode
Titles in the series (100)
002 Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds.: 002 Feeding Frenzy: The Inside Scoop on Threat Intelligence Feeds. by Inside Security Intelligence