174 Episodo

  1. UNC5221 and the BRICKSTORM Campaign

    Publicado: 22/10/2025
  2. How vSphere Became a Target for Adversaries

    Publicado: 15/9/2025
  3. AI Tools and Sentiment Within the Underground Cyber Crime Community

    Publicado: 18/8/2025
  4. Protecting the Core: Securing Protection Relays in Modern Substations

    Publicado: 28/7/2025
  5. The Rise of ClickFix

    Publicado: 15/7/2025
  6. Vishing in the Wild

    Publicado: 4/6/2025
  7. Responding to a DPRK ITW Incident

    Publicado: 19/5/2025
  8. UNC5221 and The Targeting of Ivanti Connect Secure VPNs

    Publicado: 5/5/2025
  9. Windows Remote Desktop Protocol: Remote to Rogue

    Publicado: 14/4/2025
  10. Cybersecurity Conversations with the C-Suite and Board

    Publicado: 10/3/2025
  11. What to Watch For in 2025

    Publicado: 28/2/2025
  12. Signals of Trouble

    Publicado: 19/2/2025
  13. Agentic AI in Cybersecurity

    Publicado: 5/2/2025
  14. The Art of Remediation in Incident Response

    Publicado: 2/12/2024
  15. How to Run an Effective Tabletop Exercise

    Publicado: 18/10/2024
  16. Using LLMs to Analyze Windows Binaries

    Publicado: 4/10/2024
  17. How Threat Actors Bypass Multi-Factor Authentication

    Publicado: 26/9/2024
  18. TAG's Work Tracking Commercial Surveillance Vendors

    Publicado: 4/9/2024
  19. What Iranian Threat Actors Have Been Up To This Year

    Publicado: 25/7/2024
  20. Mandiant's Approach to Securely Using AI Solutions

    Publicado: 27/6/2024

1 / 9

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!

Visit the podcast's native language site