The Defender's Advantage Podcast Podcast Por Mandiant arte de portada

The Defender's Advantage Podcast

The Defender's Advantage Podcast

De: Mandiant
Escúchala gratis

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!

© 2026 The Defender's Advantage Podcast
Episodios
  • Using GTI to Hunt Adversaries on the Dark Web
    Mar 23 2026

    In this episode of the Defenders Advantage Podcast, host Luke McNamara sits down with Google Threat Intelligence experts Jose Nazario and Brandon Wood. They dive into the rollout of new dark web and underground monitoring capabilities, explaining how AI is fundamentally changing the way defenders track adversaries.


    https://cloud.google.com/blog/products/identity-security/bringing-dark-web-intelligence-into-the-ai-era\

    Más Menos
    30 m
  • How Android Combats Mobile Scams
    Jan 16 2026

    Host Luke McNamara is joined by Eugene Liderman, Senior Director in Android's Security and Privacy Group, to discuss the evolving world of mobile-targeting scams. Eugene details some of the unique aspects to mobile scams, regional variations in tactics by scammers, and the steps Android has taken to combat this problem.

    Más Menos
    32 m
  • UNC5221 and the BRICKSTORM Campaign
    Oct 22 2025

    Sarah Yoder (Manager, Mandiant Consulting) and Ashley Pearson (Senior Analyst, Advanced Practices on Google Threat Intelligence Group) join host Luke McNamara to discuss UNC5221 and their operations involving BRICKSTORM backdoor. This highly sophisticated, suspected China-nexus cyber-espionage threat group is known for aggressively targeting internet-facing network appliances (like VPNs and firewalls) to establish long-term, stealthy access for espionage.

    Read our blog post for more: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

    Más Menos
    26 m
Todavía no hay opiniones