Decrypting Cyber Threats: Tactics, Takedowns, and Resilience
May 29, 2024 ·
43m 29s
![Decrypting Cyber Threats: Tactics, Takedowns, and Resilience](https://d3wo5wojvuv7l.cloudfront.net/t_square_limited_480/images.spreaker.com/original/5503b0f4ba29c709c9fd1ca2c64dfe64.jpg)
Download and listen anywhere
Download your favorite episodes and enjoy them, wherever you are! Sign up or log in now to access offline listening.
Description
Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research...
show more
Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint. The conversation dives into the intricate world of cyber threats and the impact of law enforcement disruptions on malware, botnets, and ransomware actors.
We'll explore how threat actors react when their preferred infrastructures or ransomware-as-a-service systems get taken down, offering insights into their various responses—from rebuilding and rebranding to the emergence of new power players in the cybercriminal ecosystem.
We also talk about:
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Don't miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.
show less
We'll explore how threat actors react when their preferred infrastructures or ransomware-as-a-service systems get taken down, offering insights into their various responses—from rebuilding and rebranding to the emergence of new power players in the cybercriminal ecosystem.
We also talk about:
- Analysis of the Hive ransomware takedown and the massive Qbot operation, including the technical and human aspects of these disruptions
- How other groups rise to prominence despite disruptions
- Differences between malware disruptions and business email compromise (BEC) or fraud-focused disruptions
- The evolution of threat actor techniques, such as, legitimate remote management tools and living off the land techniques
For more information about Proofpoint, check out our website.
Subscribe & Follow:
Don't miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.
Information
Author | Proofpoint |
Organization | Mindy |
Website | - |
Tags |
-
|
Copyright 2024 - Spreaker Inc. an iHeartMedia Company