Episodios

  • Unmasking the Unseen: Building and Benefiting from Behavioral Threat Hunting
    May 4 2025

    In today's complex threat landscape, adversaries are constantly evolving their tactics to evade traditional defenses. Behavioral threat hunting offers a proactive methodology to identify cyber threats that have infiltrated systems undetected and disrupt them before they cause significant damage, ultimately reducing attacker "dwell time". This episode delves into the fundamental requirements for establishing effective threat hunting capabilities, covering the crucial technological prerequisites like achieving sufficient visibility and storage for deep data analysis, and the necessity of a robust analysis platform. We also explore the essential personnel prerequisites, highlighting the need for skilled staffing, diverse team knowledge, and specific technical and analytical skill sets, while acknowledging the persistent challenge of skills shortages. Beyond tech and talent, we discuss the importance of foundational elements like emulation and validation, adopting a formal methodology such as the Threat Hunting Cycle, and utilizing centralized management and metrics tools to ensure consistent, repeatable, and valuable hunts. Finally, we uncover how effective threat hunting integrates with and enhances broader security operations and incident response, by improving security posture, closing visibility gaps, developing new automated detection capabilities from discovered unknown threats, and providing crucial documentation and support for incident response engagements. Join us as we explore how proactive hunting transforms security operations from reactive defense to strategic resilience.

    www.securitycareers.help/unmasking-the-unseen-why-behavioral-threat-hunting-is-essential-for-modern-security-operations

    Más Menos
    26 m
  • Beyond the Prompt: Navigating the Threats to AI Agents
    May 3 2025

    AI agents, programs designed to autonomously collect data and take actions toward specific objectives using LLMs and external tools, are rapidly becoming widespread in applications from customer service to finance. While built on LLMs, they introduce new risks by integrating tools like APIs and databases, significantly expanding their attack surface to include classic software vulnerabilities like SQL injection, remote code execution, and broken access control, in addition to inherent LLM risks like prompt injection. Our sources demonstrate that these vulnerabilities are largely framework-agnostic, stemming from insecure designs and misconfigurations rather than flaws in frameworks like CrewAI or AutoGen. Given the autonomous nature and expanded capabilities of agents, the potential impact of compromises escalates from data leakage to infrastructure takeover. This episode dives into the complex threats targeting AI agents and highlights why a layered, defense-in-depth strategy is essential, combining safeguards like Prompt Hardening, Content Filtering, Tool Input Sanitization, Tool Vulnerability Scanning, and Code Executor Sandboxing, because no single mitigation is sufficient to address the diverse attack vectors.

    www.securitycareers.help/securing-the-autonomous-frontier-layered-defenses-for-ai-agent-deployments/

    https://www.hackernoob.tips/exploring-the-attack-surface-our-guide-to-ai-agent-exploitation/

    https://vibehack.dev/

    https://devsecops.vibehack.dev

    Más Menos
    23 m
  • Space Under Pressure: Geopolitical Threats and the Evolving Cosmos (2025)
    May 2 2025
    Drawing on open-source information and eight years of collected data, the CSIS Aerospace Security Project's 2025 Space Threat Assessment explores the key developments in foreign counterspace weapons and the evolving security landscape in Earth orbit. This assessment highlights how space is becoming a more dangerous place and is increasingly woven into both peacetime and wartime activities. The report categorizes counterspace weapons into four main types: kinetic, non-kinetic, electronic, and cyber operations. While the past year saw few headline-grabbing kinetic tests, concerns persist, notably regarding Russia's pursuit of a nuclear anti-satellite capability designed to target satellites orbiting Earth, which the United States and international partners remain concerned about.

    www.myprivacy.blog/space-threats-and-the-unseen-impact-a-privacy-perspective-on-the-2025-assessment

    www.compliancehub.wiki/navigating-the-orbital-minefield-compliance-challenges-in-the-2025-space-threat-landscape/

    Más Menos
    28 m
  • The Price of Protection: Budgeting for Essential Cyber Hygiene (CIS IG1)
    May 1 2025

    This episode explores the costs associated with implementing essential cyber hygiene as outlined by the CIS Critical Security Controls Implementation Group 1 (IG1). We delve into the different approaches enterprises can take – utilizing on-premises tools, leveraging Cloud Service Providers (CSPs), or partnering with Managed Service Providers (MSPs). Drawing on the guide's research, we discuss the types of tools and policies needed for the 10 areas of cyber defense, explore budgeting considerations for different enterprise sizes, and highlight how IG1 Safeguards can provide significant protection against common threats for a relatively low cost. Learn how to make informed and prioritized decisions to secure your enterprise, whether through owned infrastructure, outsourced services, or a hybrid approach.

    www.securitycareers.help/the-price-of-protection-making-cis-ig1-cyber-hygiene-achievable-and-affordable

    https://baseline.compliancehub.wiki

    Más Menos
    14 m
  • GTIG 2024 Zero-Days: Espionage, Enterprise, and the Shifting Landscape
    Apr 30 2025

    Join us as we dive into Google Threat Intelligence Group's (GTIG) comprehensive analysis of zero-day exploitation in 2024. Drawing directly from the latest research, this episode explores the 75 zero-day vulnerabilities tracked in the wild. While the overall number saw a slight decrease from 2023, the analysis reveals a steady upward trend over the past four years. Discover the significant shift towards targeting enterprise-focused technologies, which jumped to 44% of tracked zero-days in 2024, up from 37% in 2023. We examine why security and networking products have become high-value targets, making up over 60% of enterprise exploitation, and the implications for defenders. Learn about the continued targeting of end-user platforms like desktop operating systems, especially Microsoft Windows, which saw an increase in exploitation, contrasting with decreased exploitation observed in browsers and mobile devices. We also break down who is driving this exploitation, with espionage actors (government-backed and commercial surveillance vendors) leading the charge, accounting for over 50% of attributed vulnerabilities. Hear about the persistent activity of PRC-backed groups targeting security technologies and the notable rise of North Korean actors mixing espionage and financial motives. Finally, we touch on the most frequently exploited vulnerability types and what vendors and defenders can do to counter these evolving threats. This episode provides a detailed look into the complex and changing world of zero-day exploitation in 2024, offering insights beyond just the numbers.

    breached.company/technical-brief-a-deep-dive-into-2024-zero-day-exploitation-trends

    Más Menos
    13 m
  • Verizon DBIR 2025: Navigating Third-Party Risk and the Human Factor
    Apr 29 2025
    Join us as we unpack the critical insights from the Verizon 2025 Data Breach Investigations Report. This episode dives deep into the report's most prominent themes, highlighting the ever-increasing involvement of third parties in data breaches and the persistent influence of the human element, which was involved in 60% of breaches this year. We explore the prevalent incident patterns including System Intrusion, often involving ransomware, Basic Web Application Attacks, largely driven by stolen credentials, and Social Engineering, where phishing and pretexting remain key techniques, now joined by emerging threats like prompt bombing. Drawing on data collected from November 1, 2023, to October 31, 2024, we discuss how attackers exploit vulnerabilities, how different industries and organizations of all sizes are targeted, and the importance of frameworks like VERIS for understanding the threat landscape. Tune in to gain actionable insights directly supported by the data and analysis from the DBIR sources.

    breached.company/navigating-the-modern-threat-landscape-key-insights-from-the-verizon-dbir-2025

    Más Menos
    12 m
  • The State of EU Cybersecurity: Threats, Trends, and the Evolving Landscape
    Apr 28 2025

    Explore the complex and widespread cybersecurity threat landscape currently facing the European Union. This episode delves into the findings of recent reports, highlighting how geopolitical tensions and the rapid pace of digitisation are fueling a surge in malicious cyber activity. We discuss the substantial threat level assessed for the EU, meaning direct targeting and serious disruptions are realistic possibilities [previous turn]. You'll learn about the most reported attacks, including Denial-of-Service (DoS/DDoS/RDoS) and ransomware, and how threats against data are also prevalent. We break down the key threat actors – from financially motivated cybercriminals and well-funded state-nexus groups focused on espionage and disruption, to increasingly unpredictable hacktivists driven by geopolitical events. Discover how threats are evolving, including the shift in ransomware tactics, the rise of hacker-for-hire services, the use of AI in creating fake content and misinformation, and the persistent danger posed by the exploitation of unpatched vulnerabilities and sophisticated supply chain attacks. We also look at which sectors are most targeted, including public administration and transport, and peer into the future to understand how emerging technologies like AI and quantum computing will shape the threat landscape towards 2030.

    www.compliancehub.wiki/understanding-the-evolving-cybersecurity-threat-landscape-in-the-eu-an-in-depth-analysis-for-compliance/

    https://gdpriso.com/

    https://baseline.compliancehub.wiki/

    Más Menos
    16 m
  • Integrating Incident Response: A NIST SP 800-61r3 Guide to Cyber Risk Management
    Apr 27 2025

    Incident response is a critical part of cybersecurity risk management and should be integrated across organizational operations. This episode explores the recommendations and considerations for incorporating cybersecurity incident response throughout an organization’s cybersecurity risk management activities, as described by the new NIST Special Publication (SP) 800-61 Revision 3. We'll discuss how NIST SP 800-61r3, a CSF 2.0 Community Profile, uses the NIST Cybersecurity Framework (CSF) 2.0 Functions to provide a common language and structure for these efforts. Learn how the Govern, Identify, and Protect functions support preparation activities, while the Detect, Respond, and Recover functions cover the incident response itself. We'll also highlight the crucial role of continuous improvement, feeding lessons learned back into the overall strategy. This guidance aims to help organizations prepare for incidents, reduce their number and impact, and improve the efficiency and effectiveness of detection, response, and recovery activities. This episode is intended for cybersecurity program leadership, cybersecurity personnel, and others responsible for handling cybersecurity incidents

    www.compliancehub.wiki/beyond-reaction-integrating-incident-response-into-your-cybersecurity-risk-management-strategy-with-nist-sp-800-61r3

    https://irmaturityassessment.com

    https://cyberinsurancecalc.com

    Más Menos
    17 m
adbl_web_global_use_to_activate_webcro805_stickypopup