The Threatpost Podcast

Follow The Threatpost Podcast
Share on
Copy link to clipboard

Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.

Mike Mimoso, Chris Brook


    • Aug 9, 2022 LATEST EPISODE
    • monthly NEW EPISODES
    • 20m AVG DURATION
    • 180 EPISODES


    Search for episodes from The Threatpost Podcast with a specific topic:

    Latest episodes from The Threatpost Podcast

    Inside the Hackers' Toolkit

    Play Episode Listen Later Aug 9, 2022 16:01


    There is no question that companies are in the sights of would-be criminals looking to exploit them. While companies look at solutions and trainings to help keep the perimeter secure, the biggest fail point is often the employees, AKA the human element. In this Threatpost podcast, sponsored by Egress, we sit down with Jack Chapman to discuss the steps and tactics that companies can take to stay one step ahead of their adversaries. During our conversation, we discuss: Weaknesses that attackers look to exploit Evolution of toolkits Securing MFA and more

    Being prepared for adversarial attacks

    Play Episode Listen Later Jun 2, 2022 22:10


    There is no question that the level of threats facing today's businesses continues to change on a daily basis. So what are the trends that CISOs need to be on the lookout for? For this episode of the Threatpost podcast, I am joined by Derek Manky, , Chief Security Strategist & VP Global Threat Intelligence, Fortinet's FortiGuard Labs to discuss the threats facing CISOs along with more. During the course of our discussion, we dive into: What an attack on all fronts looks like The current state of the threat landscape New techniques being leveraged be adversaries The automation of threats We also lay out what CISOs need to consider when laying out and producing their threat action plan.

    The State of Secrets Sprawl

    Play Episode Listen Later May 6, 2022 16:50


    Can I tell you a secret? Will you keep it between us? You've probably said this or heard this when it comes to friends and family. However, do you also know that secret keeping, or lack thereof is one of the biggest issues that businesses face? According to the recent The State of the Secret Sprawl from GitGuardian further defines the breadth of business secrets. “A secret can be any sensitive data that we want to keep private. When discussing secrets in the context of software development, secrets generally refer to digital authentication credentials that grant access to services, systems and data. These are most commonly API keys, usernames and passwords, or security certificates. Secrets are what tie together different building blocks of a single application by creating a secure connection between each component. Secrets grant access to the most sensitive systems.” In this podcast with Mackenzie Jackson, developer advocate at GitGuardian, we dive into the report and also the issues that corporations face with public leaks from groups like Lapsus and more, along with as ways that developers can keep their code safe. For the full report, click here.

    The Truth Behind ‘Mythical' MacOS Malware – Podcast

    Play Episode Listen Later Mar 31, 2022 18:53


    18:53 false Huntress Labs R&D Director Jamie Levy busts the old “Macs don't get viruses” myth and offers tips on how MacOS malware differs and how to protect against it.

    A Blockchain Primer and a Bored Ape Headscratcher – Podcast

    Play Episode Listen Later Mar 31, 2022 27:33


    27:33 false Still mystified by it all? Listen to KnowBe4's Dr. Lydia Kostopoulos explain what blockchain is: Now's the time to learn about associated cybersecurity risks.

    Cyberattackers Put the Pedal to the Metal – Podcast

    Play Episode Listen Later Mar 28, 2022 18:51


    18:51 false The automation and speed of attacks are increasing, says Fortinet's Derek Manky. Cases in point: Log4J and Linux as a new fav target.

    Top 3 Attack Trends in API Security – Podcast

    Play Episode Listen Later Mar 23, 2022 21:40


    21:40 false Bots & automated attacks have exploded, with attackers and developers alike in love with APIs, according to a new Cequence Security report. Hacker-in-residence Jason Kent explains the latest. full

    Reporting Mandates to Clear Up Feds' Hazy Look into Threat Landscape – Podcast

    Play Episode Listen Later Mar 16, 2022 24:20


    It's about time, AttackIQ's Jonathan Reiber said about 24H/72H report deadlines mandated in the new spending bill: Visibility into adversary behavior has been muck.

    Staff Think Conti Group Is a Legit Employer – Podcast

    Play Episode Listen Later Mar 14, 2022 39:53


    The ransomware group's benefits – monthly bonuses, fines, employee of the month, performance reviews and top-notch training materials – might be better than your own company's, says BreachQuest's Marco Figueroa. 

    Multi-Ransomwared Victims Have It Coming

    Play Episode Listen Later Mar 8, 2022 28:50


    There's a yawning gap between IT decision makers' confidence about security vs. their concession that repeated incidents are their own fault, says ExtraHop's Jamie Moles.

    Russia Leaks Data From a Thousand Cuts–Podcast

    Play Episode Listen Later Mar 3, 2022 17:42


    It's not just Ukraine: Threat intel experts are seeing a flood of data on Russian military, nukes and crooks, even with the Conti ransomware gang having shuttered its leaking Jabber chat server. 

    Securing Data With a Frenzied Remote Workforce–Podcast

    Play Episode Listen Later Feb 26, 2022 27:37


    Stock your liquor cabinets and take a shot whenever you hear GitLab Staff Security Researcher Mark Loveless say “Zero Trust.”

    The Art of Non-boring Cybersec Training–Podcast

    Play Episode Listen Later Feb 24, 2022 19:52


    With human error being the common factor in most cyberattacks, employee training has got to get better. To that end, Trustwave cybersec training expert Darren Van Booven explains the importance of fish stress balls and management buy-in.

    Killing Cloud Risk by Bulletproofing App Security: Podcast

    Play Episode Listen Later Feb 16, 2022 25:08


    Applications are the most preferred vectors for cybercriminals. Yet no single team or process can assure the rollout of safe cloud applications. From code design to unit testing to deployment, teams and tools have to work together to detect risks early while keeping the pipeline of digital products moving.   Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, help development teams evolve their processes to build security directly into their workflows for smooth and safe cloud app rollouts.  They dropped by the Threatpost podcast recently to share tips on DevSecOps, including:   How to build a continual testing, monitoring, and feedback processes to drive down application risk. Developing a continuous approach to application security and DevOps security tools. Why collaboration and continual feedback is essential across development, cloud and security teams.   …as well as how to deal with the boatload of animosity between development and security teams. One tip: Assume positive intent!

    Former FBI Gumshoe Nabs Cybercrooks Using Proven Behavioral Clues

    Play Episode Listen Later Feb 8, 2022 22:33


    22:33 false Dek: Crane Hassold, former FBI analyst turned director of threat intel at Abnormal Security, shares stories from his undercover work with cyberattackers.

    How to Buy Precious Patching Time as Log4j Exploits Fly

    Play Episode Listen Later Dec 14, 2021 19:56


    Threatpost podcast: Cybereason CTO Yonatan Striem-Amit shares details about the company's vaccine: a fast shot in the arm released within hours of the Apache Log4j zero-day horror show having been disclosed.

    Attackers Will Flock to Crypto Wallets, Linux in 2022: Podcast

    Play Episode Listen Later Nov 23, 2021 28:58


    28:58 no Cyberattackers will target those & more as they pick up APT techniques to hurl more-destructive ransomware & supply-chain attacks, says Fortinet's Derek Manky.

    Podcast: Could the Zoho Flaw Trigger the Next SolarWinds?

    Play Episode Listen Later Oct 18, 2021 11:02


    11:02 no passwords,zoho,ad,kroll,solarwinds,redscan That's what clients are worried about, says Redscan's George Glass: that the powerful, highly privileged app could be a convenient point of entry for attackers, to areas deep inside an enterprise's footprint. That's what clients are worried about, says Redscan's George Glass: that the powerful, highly privileged app could be a convenient point of entry for at

    Podcast: 67% of Orgs Have Been Hit by Ransomware at Least Once

    Play Episode Listen Later Oct 5, 2021 26:01


    26:01 no Fortinet's Derek Manky discusses a recent global survey showing that two-thirds of surveyed entities suffered at least one ransomware attack, while half were hit multiple times. Fortinet's Derek Manky discusses a recent global survey showing that two-thirds of surveyed entities suffered at

    DDoS Attacks Are a Flourishing Business for Cybercrooks – Podcast

    Play Episode Listen Later Sep 14, 2021 24:09


    Imperva's Peter Klimek visited Threatpost podcast to discuss the evolution of DDoS attacks: They started out as inconveniences but evolved to the point where attackers can disrupt businesses for as little as the price of a cup of coffee,

    Databases Pockmarked With an Average of 26 Vulnerabilities Globally – Podcast

    Play Episode Listen Later Sep 14, 2021 21:22


    Imperva's Elad Erez discusses findings that 46% of on-prem databases are sitting ducks, unpatched and vulnerable to attack, each with an average of 26 flaws.

    What Ragnar Locker Got Wrong About Ransomware Negotiators – Podcast

    Play Episode Listen Later Sep 8, 2021 13:00


    Bryce Webster-Jacobsen – director of intelligence operations at digital risk protection/ransomware negotiators GroupSense – dropped by the Threatpost podcast to tell us what percentage of Ragnar Locker's warning that victims shouldn't call the FBI/police/negotiators is a bluff and what, if anything, security teams should take seriously. 

    Verizon DBIR Marries MITRE ATT&CK – Podcast

    Play Episode Listen Later Sep 7, 2021 22:10


    22:10 no DBIR is already funny, useful & well-written. Now that it's mapped to the ATT&CK framework, security teams could finally get the holy grail of security: the answer to “Are we doing this right?” Verizon's DBIR is already funny, useful & well-written. DBIR's Alex Pinto and Rich Struse, Director of MITRE Engenuity's Center for Threat Informed Defense (CTID), discuss an enticing future: They say that with the mapping of DBIR to the ATT&CK framework, security teams could finally get the holy grail of security. Namely, the answer to “What's

    ‘Pay Ransom' Screen=Too Late, Humpty Dumpty – Podcast

    Play Episode Listen Later Aug 26, 2021 18:55


    18:55 no Splunk's Ryan Kovar discusses the rise in supply-chain attacks a la Kaseya & how to get ahead of encryption leaving your business a pile of broken shells. Splunk's Ryan Kovar discusses the rise in supply-chain attacks a la Kaseya & how to get ah

    Podcast: Ransomware Up x10; Telecoms Uber Walloped

    Play Episode Listen Later Aug 25, 2021 19:21


    19:21 no Derek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, discusses the top threats and lessons learned from the first half of 2021. Derek Manky, Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, discusses the top threats

    What's Next for T-Mobile and Its Customers? – Podcast

    Play Episode Listen Later Aug 19, 2021 16:45


    Interos CEO Jennifer Bisceglie drops by the Threatpost podcast to talk about avoiding the mess a T-Mobile size breach can lead to, with the damage it can do to a business's brand, reputation, customer loyalty and revenue stream. 

    SolarWinds 2.0 Could Set Off the Next Financial Crisis – Podcast

    Play Episode Listen Later Aug 13, 2021 15:23


    Trillions of dollars in notional value are controlled by hedge funds and private equity firms, many of which have no cybersecurity protection to speak of. The calamitous, widespread SolarWinds attacks was a wakeup call: Another attack of that ilk could lead to the next 2008-esque financial meltdown. Agio CEO Bart McDonough says AI-enabled service platform could maybe, just maybe, help avert it.

    Fuzz Off: How to Shake Up Code to Get It Right – Podcast

    Play Episode Listen Later Aug 10, 2021 15:45


    FuzzCon panelists Damilare D. Fagbemi of Resilience Software Security and Anmol Misra of Autodesk say join the party as they share fuzzing wins & fuzzing fails when building a security testing program

    We COVID-Clicked on Garbage, Report Finds: Podcast

    Play Episode Listen Later Aug 4, 2021 16:20


    n the company's annual Human Factor 2021 report assessing how the threat landscape morphed over the past year, Proofpoint researchers scratched their heads over the reasons for so many users succumbing to malicious email attachments. Could be that threat actors jumped on our Pavlovian work-from-home security conditioning, as suggested by Proofpoint vice president and general manager of email fraud defense Rob Holmes. Check out the Threatpost podcast for his take on how the pandemic influenced the threat landscape.

    ‘PwnedPiper': Devastating Bugs in >80% of Hospital Pneumatics

    Play Episode Listen Later Aug 2, 2021 11:55


    11:55 no Podcast: Blood samples aren't martinis. You can't shake them. But bugs in pneumatic control systems could lead to that, RCE or ransomware. Podcast: Blood samples aren't martinis. You can't shake them

    Podcast: Why Securing Microsoft Active Directory Is Such a Nightmare

    Play Episode Listen Later Jul 28, 2021 33:20


    SpecterOps researchers Lee Christensen and Will Schroeder discuss their work, to be presented at Black Hat, on how AD “misconfiguration debt” lays out a dizzying array of attack paths such as the one in the PetitPotam exploit for which Microsoft  rushed out a fix.

    IoT Piranhas Are Swarming Industrial Controls

    Play Episode Listen Later Jul 23, 2021 23:24


    Threat actors have been building enormous botnets using IoT devices to try to compromise the computing systems that control crucial infrastructure, such as pipelines (case in point: the DarkSide ransomware attack on Colonial Pipeline) and other utilities, preying on legacy systems that have decades-old vulnerabilities. In this Threatpost podcast, Armis CISO Curtis Simpson delves into how to fight back.

    What's Next for REvil's Victims?

    Play Episode Listen Later Jul 19, 2021 21:47


    21:47 no Nothing good, now that the ransomware gang's servers have vanished mid-negotiation, as ransomware negotiator Kurtis Minder details on Threatpost podcast. Nothing good, now that the ransomware gang's servers have vanished mid-negotiation, as ransomware negotiator Kurtis Minder details on Threatpost podcast. GroupSense's Minder offers tips on

    Protecting Phones From Pegasus-Like Spyware Attacks

    Play Episode Listen Later Jul 19, 2021 22:11


    Podcast: Is protecting your phone from spyware attacks a la NSO Group's Pegasus as simple as getting a new SIM card? Former spyware insider, current mobile white hat hacker Adam Weinberg on how to block three types of spyware attacks.

    What's Making You a Ransomware Sitting Duck

    Play Episode Listen Later Jun 17, 2021 33:33


    SophosLabs Principal Researcher Andrew Brandt discusses what makes organizations prime targets for ransomware threat actors, what steps could help them to protect themselves, and what's stopping them from implementing those steps.

    SASE & Zero Trust: The Dream Team

    Play Episode Listen Later Jun 11, 2021 20:01


    "Trust is a human emotion. Computers don't have emotions. They don't need that trust, inherently" – that's the heart of Zero Trust cybersecurity, and SASE is how to make it happen.  Forcepoint's Nico Fischbach, global CTO and VPE of SASE, and Chase Cunningham, chief strategy officer at Ericom Software, on using SASE to make Zero Trust a reality.

    Insider Risks In the Work-From-Home World

    Play Episode Listen Later Jun 11, 2021 25:12


    Forcepoint's Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk: particularly important as security perimeters have expanded due to the pandemic.

    The State of Ransomware with Fortiguard's Derek Manky

    Play Episode Listen Later Jun 2, 2021 17:50


    17:50 no darkside,Ransomware,fortinet,fortiguard In this Threatpost podcast, Fortinet's top researcher sketches out the ransom landscape, with takeaways from the DarkSide attack on Colonial Pipeline. In this Threatpost podcast, Fortinet's top researcher sketches out the ransom lands

    Effective Adoption of SASE in 2021

    Play Episode Listen Later Jun 2, 2021 21:03


    21:03 no forcepoint,sase In this Threatpost podcast, Forcepoint's SASE and Zero Trust director describes how the pandemic jump-started SASE adoption for easier, more affordable security. In this Threatpost podcast, Forcepoint's SASE and Zero Trust director describes how the pandemic jump-started SASE adoption for easier, more affordable

    Why and How Cybercrooks Milk Exploits in Underground Markets

    Play Episode Listen Later Jun 1, 2021 19:05


    19:05 no UNDERGROUND,malware,cybersecurity,cybercriminals,cyberattackers Trend Micro's Mayra Fuentes talks about the threat actors on 600+ monitored forums who requisition exploits and why they eschew bug bounty programs. Trend Micro's Mayra Fuentes talks about the threat actors on 600+ monitored f

    What's Behind the Cybercriminal Supply Chain

    Play Episode Listen Later Apr 21, 2021 22:10


    Derek Manky Chief, Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs is joined by Threatpost podcast host Cody Hackett about the cybersecurity supply chain. What is it? How is it funded? And who are the victims and criminals within this multi-million dollar dark economy?  

    Podcast: Microsoft Exchange Server Attack Onslaught Continues

    Play Episode Listen Later Mar 23, 2021 22:53


    Weeks after the disclosure around the ProxyLogon group of security bugs, exploitation attempts against unpatched Microsoft Exchange servers have skyrocketed. Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet's FortiGuard Labs, said that last week researchers with FortiGuard Labs saw activity double over two days for cybercriminals targeting the vulnerabilities. The attackers are using the flaws to deploy cryptominers, ransomware (such as the recently discovered DearCry ransomware) and other malicious campaigns, he said.

    Sponsored Podcast: Ransomware Attacks Exploded in Q4 2020

    Play Episode Listen Later Feb 26, 2021 23:03


    Ransomware attacks continue to be a top security issue plaguing companies, with researchers from Fortinet's Fortiguard Labs saying they saw an explosion in ransomware activity towards the end of the fourth quarter of 2020.

    Chinese Hackers Stole NSA-Linked Hacking Tool: Report

    Play Episode Listen Later Feb 22, 2021 19:57


    Yaniv Balmas, the head of cyber research with Check Point Software, and Oded Vanunu, the head of products vulnerability research with Check Point Software, talk on this week's Threatpost podcast about the new discoveries around the NSA-linked exploit tools, as well as the implications of the SolarWinds supply-chain hack.

    Emotet's Takedown: Have We Seen the Last of the Malware?

    Play Episode Listen Later Feb 3, 2021 17:20


    Law enforcement have been on a malware-takedown rampage: Last week, several agencies took down servers supporting the Emotet malware. Sherrod DiGrippo, senior director of threat research and detection with Proofpoint, said that no activity involving Emotet has been detected since the takedown effort occurred last week.

    Breaking Down Joe Biden's $10B Cybersecurity 'Down Payment'

    Play Episode Listen Later Jan 25, 2021 19:03


    Joe Biden's inauguration ceremony last week marked a new strategy for the government's cybersecurity initiatives, with the US president's COVID-19 relief plan including $10 billion in funding for various cybersecurity defense initiatives - from hiring key security personnel to support for the Cybersecurity Infrastructure Security Agency (CISA).

    CISOs Prep For COVID-19 Exposure Notification in the Workplace

    Play Episode Listen Later Jan 13, 2021 23:41


    In this week’s Threatpost podcast, senior editor Lindsey Welch talks with Steve Moore, chief security strategist with Exabeam, about the data privacy challenges posed by impending exposure notification implementations in the workplace.

    A Look Ahead at 2021: SolarWinds Fallout and Shifting CISO Budgets

    Play Episode Listen Later Jan 8, 2021 21:45


    Threatpost editors Tom Spring, Tara Seals and Lindsey Welch break down the top security stories to look out for in this week's first podcast of 2021 - from the SolarWinds hack to surging ransomware hospital cyberattacks. 

    Sponsored Podcast: Simplifying Proactive Defense With Threat Playbooks

    Play Episode Listen Later Dec 21, 2020 24:10


    Security defense strategy can be very complex - with security teams not dealing with mere small bits of information, but instead dealing with tens of thousands of data points, from IoCs to TTPs, said Derek Manky, Chief of Security Insights & Global Threat Alliances at Fortinet.

    Sponsored Podcast: Cybersecurity in the 'New Normal'

    Play Episode Listen Later Dec 10, 2020 29:21


    From eCommerce threats, to security concerns in connected speakers, Fortinet researchers discuss the top evolving threats of 2020, heading into the new year.

    Amnesia:33 TCP/IP Flaws Plague Millions of IoT Devices

    Play Episode Listen Later Dec 8, 2020 26:20


    Researchers - as well as the U.S. Cybersecurity Infrastructure Security Agency (CISA) - are warning of a set of serious vulnerabilities affecting TCP/IP stacks. The flaws impact millions of Internet-of-Things (IoT) devices and embedded systems, including smart thermometers, smart plugs and printers, Forescout researcher Daniel dos Santos said during this week's Threatpost podcast.

    Claim The Threatpost Podcast

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel