Click Here

166 Inside the Adversary Exploit Process


Listen Later

With thousands of vulnerabilities reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is that less sophisticated threat actors often resort to using older vulnerabilities with easily accessible resources and tutorials. 
Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.
...more
View all episodesView all episodes
Download on the App Store

Click HereBy Recorded Future News

  • 4.6
  • 4.6
  • 4.6
  • 4.6
  • 4.6

4.6

402 ratings


More shows like Click Here

View all
99% Invisible by Roman Mars

99% Invisible

26,242 Listeners

Reveal by The Center for Investigative Reporting and PRX

Reveal

8,471 Listeners

Hacked by Hacked

Hacked

187 Listeners

TechStuff by iHeartPodcasts

TechStuff

1,754 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

Uncanny Valley | WIRED by WIRED

Uncanny Valley | WIRED

507 Listeners

Risky Business by Risky Business Media

Risky Business

371 Listeners

SpyCast by SpyCast

SpyCast

1,531 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,028 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,077 Listeners

Endless Thread by WBUR

Endless Thread

2,685 Listeners

Cybersecurity Today by Jim Love

Cybersecurity Today

175 Listeners

Throughline by NPR

Throughline

16,512 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

398 Listeners