Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

166 Inside the Adversary Exploit Process

166 Inside the Adversary Exploit Process

FromInside Security Intelligence


166 Inside the Adversary Exploit Process

FromInside Security Intelligence

ratings:
Length:
19 minutes
Released:
Jul 13, 2020
Format:
Podcast episode

Description

With thousands of vulnerabilities reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is that less sophisticated threat actors often resort to using older vulnerabilities with easily accessible resources and tutorials. 
Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.
Released:
Jul 13, 2020
Format:
Podcast episode

Titles in the series (100)

Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) about the world of cyber threat intelligence.