we are gonna talk about botnets
…
continue reading
Botnet Podcasts
Have you ever clicked on a link you were unsure of, or downloaded a risky attachment? If so, then you are in danger of becoming part of a Botnet, also known as a ‘zombie army'. The term ‘zombie army’ is used to refer to a number of computer networks that have become infected as a result of malicious third party software sneaking onto a user’s computer and then linking it to others to send spam to, or steal data from. ‘How to Survive a Botnets Attack’ is a short animation that explains how to ...
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
IT authors and entrepreneurs Ryan Morris, Karl Palachuk, and Dave Sobel provide commentary on the changing world of technology opportunities and emerging tech. We want to expand the discussion from the SMB IT channel to all things tech - with one eye on the future and the other on profits. Join us!
…
continue reading
Struggling to understand all of the tech buzz words in the news? We break down complex technology concepts into bite-size pieces to talk about how to keep yourself safe online.
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is an award-winning podcast hosted by Saron Yitbarek and produced by Red Hat. Get root access to show notes, transcripts, and other associated content at https://redhat.com/commandlineheroes
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading
1
Ho-Ho-Hold Up—Is That Message Real? Bad Santas Are Sending Seasonal Scams
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Send us fan mail! Happy Holidays to all our Cyber Pals! Host Selena Larson, and co-guest ho-ho-ho hosts, Tim Kromphardt & Sarah Sabotka unwrap the surprising (and sometimes clever) ways cybercriminals use seasonal themes to trick both consumers and enterprises. From fake party invites and too-good-to-be-true discounts to holiday-flavored malware an…
…
continue reading
1
From Toasters to Botnets: Securing Everyday IoT
37:40
37:40
Play later
Play later
Lists
Like
Liked
37:40Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet o…
…
continue reading
1
Episode 214 - Bitcoin's Relevance, Cybersecurity's Future in Private Sector, and Innovation Outpacing Adoption
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51Topic 1: Is there a valid reason for Bitcoin to exist? You can now use Venmo (a subsidiary of PayPal) to pay for your tacos at Taco Bell. This is just the latest addition (see Apple Pay and Google Pay). Cash App is available indirectly as a card through Apple Pay and Google Pay. E-payments are expanding all the time. We can move money to relatives …
…
continue reading
1
Elect More Hackers: Tech Skills for Real-World Change
54:41
54:41
Play later
Play later
Lists
Like
Liked
54:41Send us fan mail! Hello to all our Cyber Squirrels! Can hackers make great public servants? Host Selena Larson, and co-guest hosts, Sarah Sabotka and Tim Kromphardt sit down with Andrew Brandt, Founder and Executive Director of Elect More Hackers — a nonprofit on a mission to get more cybersecurity and tech-minded thinkers into elected office. Toge…
…
continue reading
1
From Web Injects to Info Stealers: How Cybercriminals Stay Ahead
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53Send us fan mail! Hello to all our Cyber Sleuths! Host Selena Larson, and guest host, Sarah Sabotka take you behind the scenes of the ever-changing world of cybercrime—where attackers innovate, scams evolve, and staying one step ahead is a constant challenge. From remote monitoring and management (RMM) abuse to adversary-in-the-middle (AiTM) phishi…
…
continue reading
1
When Being Aware of Cybersecurity Means Knowing You're Human
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24Send us fan mail! Hello to all our Pumpkin Spice Cyber Friends! It’s Cybersecurity Awareness Month — and what better way to kick it off than with a deep dive into the human side of cyber threats? In this episode host Selena Larson welcomes back guest and part-time co-host Sarah Sabotka, our “Cybersecurity Awareness Month Queen” and Staff Threat Res…
…
continue reading
1
Hot sauce and hot takes: An Only Malware in the Building special
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Send us fan mail! Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst an…
…
continue reading
1
Freighty Cats: RFQ Phishing Comes to A Warehouse Near You
35:44
35:44
Play later
Play later
Lists
Like
Liked
35:44Send us fan mail! Hello to all our Cyber Stars! In this episode host Selena Larson welcomes back guest and part-time co-host Tim Kromphardt, fresh from DEFCON, to explore the world of request-for-quote (RFQ) fraud—a growing scam targeting small- to medium-sized businesses with fake purchase requests and net financing schemes. Tim explains how cyber…
…
continue reading
1
Direct Send Exploitation & URL Rewrite Attacks: What Security Teams Must Know
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Send us fan mail! Hello to all our Cyber Squirrels! In this extra-packed episode of Discarded, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending agai…
…
continue reading
1
Episode 213 - AI Conspiracy Theories, GTIA's ChannelCon Insights, and US-China Chip Trade Dynamics
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58The episode delves into the evolving landscape of artificial intelligence (AI) and its implications for businesses, particularly in the IT sector. The hosts discuss the current state of AI, emphasizing the need for IT professionals to understand and implement AI solutions effectively. They highlight the importance of training staff on AI technologi…
…
continue reading
1
Phish, Chips & Voldemort: Inside China’s Cyber Targeting of Taiwan
42:53
42:53
Play later
Play later
Lists
Like
Liked
42:53Send us fan mail! Hello to all our Cyber Panda Bears! In this extra-packed episode of Discarded, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors …
…
continue reading
1
Threat Actor Theater: TA2541, TA558, and the Cyber Heist Crew TA582
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54Send us fan mail! Hello to all our cyber pals! In this episode of Discarded, host Selena Larson and co-host, Tim Kromphardt, are joined by Joe Wise, Senior Threat Researcher at Proofpoint for a deep dive into the chaotic brilliance of mid-tier eCrime actors—including the elusive TA582. We explore recent activity from TA2541 and TA558—two groups kno…
…
continue reading
1
10 Things I Hate About Attribution: A Clustering Conundrum
56:24
56:24
Play later
Play later
Lists
Like
Liked
56:24Send us fan mail! Hello to all our cyber detectives and pedantic CTI friends! In this episode of Discarded, host Selena Larson is joined by Greg Lesnewich, Staff Threat Researcher at Proofpoint for a behind-the-scenes look at one of the most frustratingly fascinating attribution cases yet. What begins as a lighthearted rant: “10 Things I Hate About…
…
continue reading
1
Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49Send us fan mail! Hello to all our Cyber Pals! In this episode of Discarded, host Selena Larson and co-host Sara Sabotka are joined by Saher Naumaan and Greg Lesnewich, teammates on the espionage threat research team at Proofpoint to unravel the multifaceted—and often bizarre—world of North Korean cyber operations. The team explores: What sets DPRK…
…
continue reading
1
Signatures and Surprises: Inside the Emerging Threats Team
43:55
43:55
Play later
Play later
Lists
Like
Liked
43:55Send us fan mail! Hello to all our Cyber Masked Vigilantes! In this episode of Discarded, host Selena Larson and co-host Tim Kromhardt are joined by James Emery-Callcott, a Security Researcher on Proofpoint’s Emerging Threats team, for an insider’s look at the technical, tactical, and collaborative forces shaping modern network detection. James tak…
…
continue reading
1
DBIR Deep Dive: Identity, Access, and the Expanding Attack Surface
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41Send us fan mail! Hello to all our Cyber Stars! Join host Selena Larson, and guest host, Sarah Sabotka, as they sit down with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business and the lead author behind the industry-defining Verizon Data Breach Investigations Report (DBIR). Together, they unpack the most pressing findings fr…
…
continue reading
1
Episode 212 - CISA updates, taxing IT professionals, and standing by generative AI
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13Welcome to Episode 212 At 212 degrees fahrenheit, water becomes steam. At 211 it’s hot. At 212 you can move a locomotive or make electricity. We are happy to bring you episode 212 of the Killing IT Podcast! Please share this podcast on Apple, iHeart, or wherever you listen. Sponsored by… The Small Biz Thoughts Technology Community. The best deal in…
…
continue reading
1
The ClickFix Convergence: How Threat Actors Blur the Lines
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49Send us fan mail! Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naumaan, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines. At the center of the conversation is ClickFix—a fast-evolving social engi…
…
continue reading
1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Send us fan mail! Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conver…
…
continue reading
1
Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35Send us fan mail! Hello to all our Cyber Cherry Blossoms! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Andrew Couts, Senior Editor, Security and Investigations at WIRED. Andrew shares insights into his work overseeing cybersecurity coverage and investigative reporting, collaborating with news…
…
continue reading
1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft's AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading
Send us fan mail! Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals a…
…
continue reading
1
Your Best Defense against Social Engineering: The Gray-Matter Firewall
51:06
51:06
Play later
Play later
Lists
Like
Liked
51:06Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest hosts, Sarah Sabotka and Tim Kromphardt, both Senior Threat Researchers from Proofpoint, as they dive into the realities of current social engineering schemes —especially during high-risk times like tax season. Cybercriminals exploit fear, urgency, and excitement to ma…
…
continue reading
1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading
1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading
1
Hiding in Plain Sight: How Defenders Get Creative with Image Detection
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest host, Sarah Sabotka, as they speak with Kyle Eaton, Senior Security Research Engineer at Proofpoint. They explore the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses. From image lures embedded in emails, PDF…
…
continue reading
1
Episode 211 - CISA, DeepSeek, and Competing with Microsoft
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Topic 1: CISA Under the Microscope CISA was called out in the Project 2025 document as a left-wing organization inside the government due to their warning about election interference. It is now subject to cuts and scrutiny. In the mass firings at DHS on February 14th, 130 employees at CISA were fired as they were “probationary” employees. Many MSPs…
…
continue reading
1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In today's episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we're also uncover…
…
continue reading
1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Welcome back to Exploit Brokers! In today's video, we dive deep into a critical 7‑Zip vulnerability that's being exploited by Russian cybercriminals to bypass Windows' security protections. If you've used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading
1
Cyber Groundhog Day and romance scams, featuring Only Malware in the Building
40:48
40:48
Play later
Play later
Lists
Like
Liked
40:48Send us fan mail! Hey Cyber Pals! This week we are doing a very special spotlight on a recent episode from Only Malware in the Building. Our very own, Selena Larson, also co-hosts on this fabulous podcast. Be sure to check it out and enjoy! Find more OMIB: https://thecyberwire.com/podcasts/only-malware-in-the-building/9/notes —---------------------…
…
continue reading
1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Lazarus Group's Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea's Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading
1
HN53 - AI's Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46In this episode, we're uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We'll also expose how cybercriminals are escalating their tactics,…
…
continue reading
1
The Power of Partnerships: An Interview with the NSA’s Kristina Walter
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Send us fan mail! Hello to all our Cyber Magicians! Join host Selena Larson and guest host, Joshua Miller, as they speak with Kristina Walter, the Chief of NSA’s Cybersecurity Collaboration Center. They explore the cutting-edge collaborations between the NSA and industry partners to combat cyber threats, with a deep dive into the NSA’s Cybersecurit…
…
continue reading
1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🔒🚗 Volkswagen's Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today's episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen's 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading
1
The Battle for a Safer Internet: Inside Domain Takedowns and Threat Actor Tactics
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05Send us fan mail! Hello to all our Cyber Magicians! Join host Selena Larson and guest host,Tim Kromphardt, as they speak with Hannah Rapetti, the Takedown Services Manager at Proofpoint. Hannah shares her fascinating journey from librarian to cybersecurity expert, detailing her path into the industry through certifications, CTFs (Capture the Flag),…
…
continue reading
1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We'll explore how third-party vendor BeyondTrust …
…
continue reading
1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading
1
Hackers, Heists, and Heroes: The Evolving Ransomware Game
57:06
57:06
Play later
Play later
Lists
Like
Liked
57:06Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest, ransomware expert, Allan Liska, CSIRT at Recorded Future, drops by to share his creative take on cyber-themed graphic novels, proving there’s nothing ransomware can’t inspire—even superheroes. In this episode, we uncover the shadowy ecosystem driving ransomware attack…
…
continue reading
1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group's Crypto Hacks Revealed
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15We're diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you're eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea's infamous ha…
…
continue reading
Uncover the fascinating yet chilling story of Hydra Market, the dark web's largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We'll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading
1
Stealth, Scale, and Strategy: Exploring China’s Covert Network Tactics
49:28
49:28
Play later
Play later
Lists
Like
Liked
49:28Send us fan mail! Hello to all our Cyber Frogs! Join host Selena Larson and guest host, Sarah Sabotka, explore the evolving tactics of China-based nation-state threat actors with guest Mark Kelly, Staff Threat Researcher at Proofpoint. They focus on TA415 (APT41 or Brass Typhoon), examining its combination of cybercrime and state-sponsored espionag…
…
continue reading
1
HN47 - Andrew Tate's Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03Andrew Tate's platform, formerly known as Hustler's University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we'll break down the Andrew Tate hack, the implications…
…
continue reading
1
KIT Episode Episode 210 - Robots, Industry Finance, and a Practical Approach to AI
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15The Q4 2024 Killing IT Podcast features what may be our last discussion of robots for a long time! Topic One - Where Are My Robots??? We’ve been talking about this for five years - So where are the robots? We have a massive personnel shortage on many fronts. AI is creating jobs faster and faster. So why haven’t robots evolved to serve us? We’re on …
…
continue reading
1
HN46 - Phobos' $16M Haul & Helldown's Secret Exploits – 2024's Ransomware Crisis
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin's extradition to the U.S. We also explore the rise of Helldown…
…
continue reading
1
Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish
51:07
51:07
Play later
Play later
Lists
Like
Liked
51:07Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest, Genina Po, Threat Researcher at Emerging Threats at Proofpoint. She shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures. Using tools like Suricata to create detections for malicious activity, she maps out …
…
continue reading