174 Episoder

  1. UNC5221 and the BRICKSTORM Campaign

    Publisert: 22.10.2025
  2. How vSphere Became a Target for Adversaries

    Publisert: 15.9.2025
  3. AI Tools and Sentiment Within the Underground Cyber Crime Community

    Publisert: 18.8.2025
  4. Protecting the Core: Securing Protection Relays in Modern Substations

    Publisert: 28.7.2025
  5. The Rise of ClickFix

    Publisert: 15.7.2025
  6. Vishing in the Wild

    Publisert: 4.6.2025
  7. Responding to a DPRK ITW Incident

    Publisert: 19.5.2025
  8. UNC5221 and The Targeting of Ivanti Connect Secure VPNs

    Publisert: 5.5.2025
  9. Windows Remote Desktop Protocol: Remote to Rogue

    Publisert: 14.4.2025
  10. Cybersecurity Conversations with the C-Suite and Board

    Publisert: 10.3.2025
  11. What to Watch For in 2025

    Publisert: 28.2.2025
  12. Signals of Trouble

    Publisert: 19.2.2025
  13. Agentic AI in Cybersecurity

    Publisert: 5.2.2025
  14. The Art of Remediation in Incident Response

    Publisert: 2.12.2024
  15. How to Run an Effective Tabletop Exercise

    Publisert: 18.10.2024
  16. Using LLMs to Analyze Windows Binaries

    Publisert: 4.10.2024
  17. How Threat Actors Bypass Multi-Factor Authentication

    Publisert: 26.9.2024
  18. TAG's Work Tracking Commercial Surveillance Vendors

    Publisert: 4.9.2024
  19. What Iranian Threat Actors Have Been Up To This Year

    Publisert: 25.7.2024
  20. Mandiant's Approach to Securely Using AI Solutions

    Publisert: 27.6.2024

1 / 9

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!

Visit the podcast's native language site