<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://rss.buzzsprout.com/2445401.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>DISCARDED: Tales From the Threat Research Trenches</title>

  <lastBuildDate>Tue, 14 Apr 2026 04:05:11 -0400</lastBuildDate>
  <link>https://www.spreaker.com/show/discarded-tales-from-the-threat-research_1</link>
  <language>en</language>
  <copyright>© 2026 DISCARDED: Tales From the Threat Research Trenches</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>79d861af-c065-5766-8fe7-b2a147af33f2</podcast:guid>
  <podcast:txt purpose="verify">pfpt-podcasts@proofpoint.com</podcast:txt>
  <itunes:author>Proofpoint</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.<br>Welcome to DISCARDED</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Proofpoint</itunes:name>
    <itunes:email>pfpt-podcasts@proofpoint.com</itunes:email>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/wcy5639erdgujwrlba3zece9lz9f?.jpg</url>
     <title>DISCARDED: Tales From the Threat Research Trenches</title>
     <link>https://www.spreaker.com/show/discarded-tales-from-the-threat-research_1</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/wcy5639erdgujwrlba3zece9lz9f?.jpg" />
  <itunes:category text="Technology" />
  <item>
    <itunes:title>Magic Packets &amp; Stealth Backdoors: The Art of Detection Engineering</itunes:title>
    <title>Magic Packets &amp; Stealth Backdoors: The Art of Detection Engineering</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Daffodils! Host Selena Larson, and guest Host, Tim Kromphardt, sit down with Stuart Del Caliz, Senior Threat Detection Engineer at Proofpoint, to unpack the stealthy world of backdoors, malware detection, and the “secret signals” threat actors use to stay hidden. From magic packets and port knocking to sophisticated backdoors like BPFdoor, Stuart shares how attackers design covert communication methods—and how defenders work to uncover them without ove...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Daffodils! Host Selena Larson, and guest Host, Tim Kromphardt, sit down with Stuart Del Caliz, Senior Threat Detection Engineer at Proofpoint, to unpack the stealthy world of backdoors, malware detection, and the “secret signals” threat actors use to stay hidden.</b></p><p><b>From magic packets and port knocking to sophisticated backdoors like BPFdoor, Stuart shares how attackers design covert communication methods—and how defenders work to uncover them without overwhelming security teams with noise. The conversation blends deep technical insight with real-world analogies (think speakeasy knocks and undercover “internet cops”) to make complex detection strategies easier to understand.</b></p><p><br/></p><p><b>You’ll also hear:</b></p><ul><li><b>How detection engineers balance accuracy and performance when writing IDS/IPS signatures</b></li><li><b>Why some advanced malware can remain undetected for years—and whether we’re simply not seeing it</b></li><li><b>How historic leaks like Shadow Brokers still influence modern attack techniques</b></li><li><b>The role of “pattern matching” in identifying evolving malware behaviors</b></li><li><b>How file metadata and revoked certificates can reveal threats hiding in plain sight</b></li><li><b>Why community collaboration and feedback loops are critical to stronger detections</b></li></ul><p><b>Whether you’re a security practitioner or deep in the trenches, this episode offers a closer look at the craft of detection engineering—and the constant challenge of writing high-fidelity detections against increasingly evasive threat techniques.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='https://community.emergingthreats.net/'><b>https://community.emergingthreats.net/</b></a></p><p><a href='https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/'><b>https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/</b></a></p><p><a href='https://www.wired.com/story/nsa-hacking-tools-stolen-hackers/'><b>https://www.wired.com/story/nsa-hacking-tools-stolen-hackers/</b></a></p><p><a href='https://github.com/x0rz/EQGRP'><b>https://github.com/x0rz/EQGRP</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Daffodils! Host Selena Larson, and guest Host, Tim Kromphardt, sit down with Stuart Del Caliz, Senior Threat Detection Engineer at Proofpoint, to unpack the stealthy world of backdoors, malware detection, and the “secret signals” threat actors use to stay hidden.</b></p><p><b>From magic packets and port knocking to sophisticated backdoors like BPFdoor, Stuart shares how attackers design covert communication methods—and how defenders work to uncover them without overwhelming security teams with noise. The conversation blends deep technical insight with real-world analogies (think speakeasy knocks and undercover “internet cops”) to make complex detection strategies easier to understand.</b></p><p><br/></p><p><b>You’ll also hear:</b></p><ul><li><b>How detection engineers balance accuracy and performance when writing IDS/IPS signatures</b></li><li><b>Why some advanced malware can remain undetected for years—and whether we’re simply not seeing it</b></li><li><b>How historic leaks like Shadow Brokers still influence modern attack techniques</b></li><li><b>The role of “pattern matching” in identifying evolving malware behaviors</b></li><li><b>How file metadata and revoked certificates can reveal threats hiding in plain sight</b></li><li><b>Why community collaboration and feedback loops are critical to stronger detections</b></li></ul><p><b>Whether you’re a security practitioner or deep in the trenches, this episode offers a closer look at the craft of detection engineering—and the constant challenge of writing high-fidelity detections against increasingly evasive threat techniques.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='https://community.emergingthreats.net/'><b>https://community.emergingthreats.net/</b></a></p><p><a href='https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/'><b>https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/</b></a></p><p><a href='https://www.wired.com/story/nsa-hacking-tools-stolen-hackers/'><b>https://www.wired.com/story/nsa-hacking-tools-stolen-hackers/</b></a></p><p><a href='https://github.com/x0rz/EQGRP'><b>https://github.com/x0rz/EQGRP</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/19011160-magic-packets-stealth-backdoors-the-art-of-detection-engineering.mp3" length="24414496" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-19011160</guid>
    <pubDate>Tue, 14 Apr 2026 04:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2445401/19011160/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/19011160/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/19011160/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/19011160/transcript.vtt" type="text/vtt" />
    <itunes:duration>2031</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>99</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Regional Threats, Global Impact: A TA2725 Case Study</itunes:title>
    <title>Regional Threats, Global Impact: A TA2725 Case Study</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Guest host Sarah Sabotka sits down with Senior Threat Researcher Jared Peck to unpack one of the most dynamic and persistent cybercrime groups operating today: TA2725, also known as “Grana.” From its roots in Latin America to its global reach, TA2725 stands out for its adaptability—and its relentless pursuit of financial gain. Jared shares how the group evolved from a high-volume malware operator into a multifaceted threat actor running phishing,...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Guest host Sarah Sabotka sits down with Senior Threat Researcher Jared Peck to unpack one of the most dynamic and persistent cybercrime groups operating today: TA2725, also known as “Grana.”</p><p>From its roots in Latin America to its global reach, TA2725 stands out for its adaptability—and its relentless pursuit of financial gain. Jared shares how the group evolved from a high-volume malware operator into a multifaceted threat actor running phishing, fraud, and malware campaigns simultaneously. The conversation dives into how Grana targets regions like Brazil and Mexico, why their tactics shift across geographies, and what makes their operations uniquely complex.</p><p>You’ll also hear:</p><ul><li>How threat actors “graduate” to official TA designations (and why it’s a big win for researchers)<br/><br/><br/></li><li>The impact of law enforcement disruptions on major malware operations like Grandoreiro<br/><br/><br/></li><li>Why Latin America’s banking infrastructure shapes cybercrime tactics differently<br/><br/><br/></li><li>The rise (and fall) of RMM tools in TA2725’s playbook<br/><br/><br/></li><li>What clues reveal whether activity comes from one group—or an entire cybercrime “service” ecosystem</li></ul><p>Whether you’re in cybersecurity or just curious about how modern cybercrime operates, this episode offers a fascinating look at a threat actor that refuses to stay in one lane—and what that means for organizations worldwide.</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Guest host Sarah Sabotka sits down with Senior Threat Researcher Jared Peck to unpack one of the most dynamic and persistent cybercrime groups operating today: TA2725, also known as “Grana.”</p><p>From its roots in Latin America to its global reach, TA2725 stands out for its adaptability—and its relentless pursuit of financial gain. Jared shares how the group evolved from a high-volume malware operator into a multifaceted threat actor running phishing, fraud, and malware campaigns simultaneously. The conversation dives into how Grana targets regions like Brazil and Mexico, why their tactics shift across geographies, and what makes their operations uniquely complex.</p><p>You’ll also hear:</p><ul><li>How threat actors “graduate” to official TA designations (and why it’s a big win for researchers)<br/><br/><br/></li><li>The impact of law enforcement disruptions on major malware operations like Grandoreiro<br/><br/><br/></li><li>Why Latin America’s banking infrastructure shapes cybercrime tactics differently<br/><br/><br/></li><li>The rise (and fall) of RMM tools in TA2725’s playbook<br/><br/><br/></li><li>What clues reveal whether activity comes from one group—or an entire cybercrime “service” ecosystem</li></ul><p>Whether you’re in cybersecurity or just curious about how modern cybercrime operates, this episode offers a fascinating look at a threat actor that refuses to stay in one lane—and what that means for organizations worldwide.</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18912558-regional-threats-global-impact-a-ta2725-case-study.mp3" length="27607310" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18912558</guid>
    <pubDate>Thu, 26 Mar 2026 11:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18912558/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18912558/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18912558/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18912558/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2445401/18912558/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Regional Threats, Global Impact: A TA2725 Case Study" />
  <psc:chapter start="1:42" title="Meet TA2725 (“Grana”)" />
  <psc:chapter start="2:12" title="Naming Threat Actors" />
  <psc:chapter start="3:10" title="Evasion &amp; Geofencing" />
  <psc:chapter start="3:44" title="What “Grana” Means" />
  <psc:chapter start="3:56" title="New LATAM Threat Activity" />
  <psc:chapter start="5:04" title="Expanding Beyond Brazil" />
  <psc:chapter start="9:03" title="Cybercrime-as-a-Service?" />
  <psc:chapter start="11:10" title="Experimenting with New Tactics" />
  <psc:chapter start="15:16" title="Law Enforcement Disruption" />
  <psc:chapter start="17:27" title="Why Threats Come Back" />
  <psc:chapter start="18:12" title="RMM Tools Trend" />
  <psc:chapter start="21:11" title="Why Global Companies Are Hit" />
  <psc:chapter start="24:07" title="The Human Side of Threat Actors" />
  <psc:chapter start="24:09" title="Motivation: Money First" />
  <psc:chapter start="27:55" title="New LATAM Threat Activity" />
  <psc:chapter start="33:23" title="Delphi as a Clue" />
  <psc:chapter start="33:49" title="Global Impact of TA2725" />
  <psc:chapter start="36:30" title="The Human Side of Threat Actors" />
</psc:chapters>
    <itunes:duration>2297</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>98</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>TrustConnect RAT: Inside a Vibe-Coded Malware Ecosystem</itunes:title>
    <title>TrustConnect RAT: Inside a Vibe-Coded Malware Ecosystem</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Tommy Madjar, Senior Threat Researcher from Proofpoint, to unpack one of the strangest malware investigations of the year: TrustConnect RAT. What started as a seemingly legitimate remote management tool quickly unraveled into a bizarre, fast-evolving ecosystem of “vibe-coded” malware. TrustConnect masqueraded as a polished RMM platform—complete with fake testimonials, inflated customer cou...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Tommy Madjar, Senior Threat Researcher from Proofpoint, to unpack one of the strangest malware investigations of the year: TrustConnect RAT.</b></p><p><b>What started as a seemingly legitimate remote management tool quickly unraveled into a bizarre, fast-evolving ecosystem of “vibe-coded” malware. TrustConnect masqueraded as a polished RMM platform—complete with fake testimonials, inflated customer counts, and even an extended validation (EV) code-signing certificate to appear trustworthy. But beneath the surface? Sloppy AI-generated web panels, exposed administrative pages, and a backend that literally labeled infected machines as “victims.”</b></p><p><b>Tommy walks through how the team discovered the malware, why attackers are increasingly building their own fake RMM platforms instead of abusing legitimate ones, and how the use of EV certificates helped the malware evade detection across security tools. </b></p><p><b>The conversation also dives into:</b></p><ul><li><b>The explosion of legitimate RMM abuse in cybercrime<br/><br/></b><br/></li><li><b>How AI-assisted “vibe coding” is lowering the barrier to entry for malware development<br/><br/></b><br/></li><li><b>The surprising operational security failures that exposed both the malware author and their customers<br/><br/></b><br/></li><li><b>Connections to past crimeware activity and possible ties to known actors<br/><br/></b><br/></li><li><b>The rapid evolution of the “Connect” malware family, including newly spotted variants<br/><br/></b><br/></li><li><b>How Proofpoint disrupted the operation by working with partners to revoke certificates and take down infrastructure</b></li></ul><p><br/></p><p><b>Along the way, the team explores a broader theme: what happens when threat actors move fast with AI—but don’t fully understand security fundamentals? </b></p><p><br/></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat'><b>https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat</b></a></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Tommy Madjar, Senior Threat Researcher from Proofpoint, to unpack one of the strangest malware investigations of the year: TrustConnect RAT.</b></p><p><b>What started as a seemingly legitimate remote management tool quickly unraveled into a bizarre, fast-evolving ecosystem of “vibe-coded” malware. TrustConnect masqueraded as a polished RMM platform—complete with fake testimonials, inflated customer counts, and even an extended validation (EV) code-signing certificate to appear trustworthy. But beneath the surface? Sloppy AI-generated web panels, exposed administrative pages, and a backend that literally labeled infected machines as “victims.”</b></p><p><b>Tommy walks through how the team discovered the malware, why attackers are increasingly building their own fake RMM platforms instead of abusing legitimate ones, and how the use of EV certificates helped the malware evade detection across security tools. </b></p><p><b>The conversation also dives into:</b></p><ul><li><b>The explosion of legitimate RMM abuse in cybercrime<br/><br/></b><br/></li><li><b>How AI-assisted “vibe coding” is lowering the barrier to entry for malware development<br/><br/></b><br/></li><li><b>The surprising operational security failures that exposed both the malware author and their customers<br/><br/></b><br/></li><li><b>Connections to past crimeware activity and possible ties to known actors<br/><br/></b><br/></li><li><b>The rapid evolution of the “Connect” malware family, including newly spotted variants<br/><br/></b><br/></li><li><b>How Proofpoint disrupted the operation by working with partners to revoke certificates and take down infrastructure</b></li></ul><p><br/></p><p><b>Along the way, the team explores a broader theme: what happens when threat actors move fast with AI—but don’t fully understand security fundamentals? </b></p><p><br/></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat'><b>https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat</b></a></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18820138-trustconnect-rat-inside-a-vibe-coded-malware-ecosystem.mp3" length="30855007" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18820138</guid>
    <pubDate>Tue, 10 Mar 2026 04:00:00 -0400</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18820138/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18820138/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18820138/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2445401/18820138/transcript.vtt" type="text/vtt" />
    <podcast:chapters url="https://www.buzzsprout.com/2445401/18820138/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="TrustConnect RAT: Inside a Vibe-Coded Malware Ecosystem" />
  <psc:chapter start="2:15" title="The RMM Explosion: Why Remote Tools Are Being Abused" />
  <psc:chapter start="6:40" title="A “Legitimate” Website That Wasn’t" />
  <psc:chapter start="10:05" title="Why Build a Fake RMM Instead of Abusing a Real One?" />
  <psc:chapter start="14:30" title="Party Invites, Tax Lures, and Campaign Chaos" />
  <psc:chapter start="18:10" title="Vibe Coding the Malware Panel (and Getting It Very Wrong)" />
  <psc:chapter start="22:45" title="Exposed Admin Pages and the “Victims” Tab" />
  <psc:chapter start="26:30" title="EV Certificates: Signed, Trusted, and Malicious" />
  <psc:chapter start="31:20" title="Detection Challenges and Early Signals" />
  <psc:chapter start="33:44" title="Disruption Efforts and Certificate Revocation" />
  <psc:chapter start="34:50" title="Connecting the Dots to Past Crimeware Activity" />
  <psc:chapter start="38:15" title="The Expanding “Connect” Malware Family" />
</psc:chapters>
    <itunes:duration>2568</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>97</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI as a Tool, Not a Replacement: Malware Research in the Age of LLMs</itunes:title>
    <title>AI as a Tool, Not a Replacement: Malware Research in the Age of LLMs</title>
    <itunes:summary><![CDATA[Send us fan mail!  Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Kyle Cucci, and Dr. Chris Wakelin, Threat Researchers from Proofpoint. They unpack how artificial intelligence is shaping modern malware analysis and detection workflows.  The conversation explores how large language models are already embedded in day-to-day security operations—from accelerating rule creation and tooling development to helping analysts quickly interpret complex malwar...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b><br/>Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Kyle Cucci, and Dr. Chris Wakelin, Threat Researchers from Proofpoint. They unpack how artificial intelligence is shaping modern malware analysis and detection workflows. </b></p><p><b>The conversation explores how large language models are already embedded in day-to-day security operations—from accelerating rule creation and tooling development to helping analysts quickly interpret complex malware behavior.</b></p><p><b>Drawing on real-world examples from the team’s work, the episode highlights both the promise and the limitations of AI in cybersecurity. Chris and Kyle share how AI can streamline tedious reverse-engineering tasks, compare malware variants, and surface insights faster—while emphasizing the ongoing need for expert validation, thoughtful prompting, and a human-in-the-loop approach to ensure accuracy and reliability.</b></p><p><b>We also discuss:</b></p><ul><li><b>Practical ways AI is used today to support malware reverse engineering and detection development<br/><br/></b><br/></li><li><b>Prompting strategies that help reduce hallucinations and improve analysis outcomes<br/><br/></b><br/></li><li><b>The role of MCP (model context protocol) and emerging agentic AI concepts in security tooling<br/><br/></b><br/></li><li><b>Indicators and characteristics of AI-assisted malware development<br/><br/></b><br/></li><li><b>Real-world examples of prompt injection attempts within malicious code<br/><br/></b><br/></li><li><b>Whether AI-generated malware meaningfully changes defender workflows or primarily increases speed and scale<br/><br/></b><br/></li><li><b>How defenders and threat actors alike are leveraging the same AI capabilities across the threat landscape</b></li></ul><p><b>Ultimately, this episode offers a balanced look at AI’s growing influence in cybersecurity—showing how intelligent tools can amplify analyst effectiveness while reinforcing that expertise and critical thinking remain central to effective malware defense.</b></p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b><br/>Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Kyle Cucci, and Dr. Chris Wakelin, Threat Researchers from Proofpoint. They unpack how artificial intelligence is shaping modern malware analysis and detection workflows. </b></p><p><b>The conversation explores how large language models are already embedded in day-to-day security operations—from accelerating rule creation and tooling development to helping analysts quickly interpret complex malware behavior.</b></p><p><b>Drawing on real-world examples from the team’s work, the episode highlights both the promise and the limitations of AI in cybersecurity. Chris and Kyle share how AI can streamline tedious reverse-engineering tasks, compare malware variants, and surface insights faster—while emphasizing the ongoing need for expert validation, thoughtful prompting, and a human-in-the-loop approach to ensure accuracy and reliability.</b></p><p><b>We also discuss:</b></p><ul><li><b>Practical ways AI is used today to support malware reverse engineering and detection development<br/><br/></b><br/></li><li><b>Prompting strategies that help reduce hallucinations and improve analysis outcomes<br/><br/></b><br/></li><li><b>The role of MCP (model context protocol) and emerging agentic AI concepts in security tooling<br/><br/></b><br/></li><li><b>Indicators and characteristics of AI-assisted malware development<br/><br/></b><br/></li><li><b>Real-world examples of prompt injection attempts within malicious code<br/><br/></b><br/></li><li><b>Whether AI-generated malware meaningfully changes defender workflows or primarily increases speed and scale<br/><br/></b><br/></li><li><b>How defenders and threat actors alike are leveraging the same AI capabilities across the threat landscape</b></li></ul><p><b>Ultimately, this episode offers a balanced look at AI’s growing influence in cybersecurity—showing how intelligent tools can amplify analyst effectiveness while reinforcing that expertise and critical thinking remain central to effective malware defense.</b></p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18747963-ai-as-a-tool-not-a-replacement-malware-research-in-the-age-of-llms.mp3" length="36317237" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18747963</guid>
    <pubDate>Thu, 26 Feb 2026 04:00:00 -0500</pubDate>
    <itunes:duration>3023</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>96</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Snowball Learning: Getting Real About Cybersecurity Training</itunes:title>
    <title>Snowball Learning: Getting Real About Cybersecurity Training</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Dr. Bob Hausmann, Lead Cognitive Scientist of Human Risk Management at Proofpoint. They have a timely conversation on whether cybersecurity training actually works and what it takes to make it effective. They unpack why traditional annual training and phishing simulations often fall short, and how insights from cognitive psychology can help organizations design awareness programs that truly...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Dr. Bob Hausmann, Lead Cognitive Scientist of Human Risk Management at Proofpoint. They have a timely conversation on whether cybersecurity training actually works and what it takes to make it effective.</b></p><p><b>They unpack why traditional annual training and phishing simulations often fall short, and how insights from cognitive psychology can help organizations design awareness programs that truly change behavior. Drawing on Dr. Bob’s recent research, the conversation explores just-in-time nudges, microlearning, and how understanding attention, memory, and emotion can make security guidance more actionable in the moments that matter most.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>Why once-a-year security training shows little impact on real-world behavior<br/><br/></b><br/></li><li><b>How just-in-time nudges work and where they fit into security awareness programs<br/><br/></b><br/></li><li><b>The role of cognitive load, attention, and repetition in learning and memory<br/><br/></b><br/></li><li><b>How amygdala hijack and emotional manipulation factor into phishing success<br/><br/></b><br/></li><li><b>Why foundational knowledge is critical for nudges to be effective<br/><br/></b><br/></li><li><b>The difference between education-driven nudges and punitive approaches to training<br/><br/></b><br/></li><li><b>Practical ways organizations can design training that fits into everyday workflows</b></li></ul><p><br/></p><p><b>This episode offers a research-backed, human-centered look at security awareness—showing why better outcomes depend less on blaming users and more on designing training that works with the brain, not against it.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/security-awareness-training/cybersecurity-nudges-cautionary-tale'>https://www.proofpoint.com/us/blog/security-awareness-training/cybersecurity-nudges-cautionary-tale</a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Dr. Bob Hausmann, Lead Cognitive Scientist of Human Risk Management at Proofpoint. They have a timely conversation on whether cybersecurity training actually works and what it takes to make it effective.</b></p><p><b>They unpack why traditional annual training and phishing simulations often fall short, and how insights from cognitive psychology can help organizations design awareness programs that truly change behavior. Drawing on Dr. Bob’s recent research, the conversation explores just-in-time nudges, microlearning, and how understanding attention, memory, and emotion can make security guidance more actionable in the moments that matter most.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>Why once-a-year security training shows little impact on real-world behavior<br/><br/></b><br/></li><li><b>How just-in-time nudges work and where they fit into security awareness programs<br/><br/></b><br/></li><li><b>The role of cognitive load, attention, and repetition in learning and memory<br/><br/></b><br/></li><li><b>How amygdala hijack and emotional manipulation factor into phishing success<br/><br/></b><br/></li><li><b>Why foundational knowledge is critical for nudges to be effective<br/><br/></b><br/></li><li><b>The difference between education-driven nudges and punitive approaches to training<br/><br/></b><br/></li><li><b>Practical ways organizations can design training that fits into everyday workflows</b></li></ul><p><br/></p><p><b>This episode offers a research-backed, human-centered look at security awareness—showing why better outcomes depend less on blaming users and more on designing training that works with the brain, not against it.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/security-awareness-training/cybersecurity-nudges-cautionary-tale'>https://www.proofpoint.com/us/blog/security-awareness-training/cybersecurity-nudges-cautionary-tale</a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18656053-snowball-learning-getting-real-about-cybersecurity-training.mp3" length="30484806" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18656053</guid>
    <pubDate>Tue, 10 Feb 2026 14:00:00 -0500</pubDate>
    <itunes:duration>2537</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>95</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Emerging Threats in 2026: Inside Proofpoint’s Detection Playbook</itunes:title>
    <title>Emerging Threats in 2026: Inside Proofpoint’s Detection Playbook</title>
    <itunes:summary><![CDATA[Send us fan mail!  Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Rich Gonzalez, Director of Emerging Threats at Proofpoint, to kick off 2026 with a behind-the-scenes look at how emerging threats are detected, tracked, and turned into real-world protections for defenders. They explore what it really takes to keep pace with an always-on threat landscape, from rapid response to newly released proof-of-concepts, to why certain vulnerabilities like Log4j co...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b><br/>Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Rich Gonzalez, Director of Emerging Threats at Proofpoint, to kick off 2026 with a behind-the-scenes look at how emerging threats are detected, tracked, and turned into real-world protections for defenders.</b></p><p><b>They explore what it really takes to keep pace with an always-on threat landscape, from rapid response to newly released proof-of-concepts, to why certain vulnerabilities like Log4j continue to dominate attacker activity years later. The conversation also digs into alert fatigue, the realities of SOC burnout, and where automation and AI can genuinely help versus where trust, accuracy, and human judgment still matter most.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>How Proofpoint’s Emerging Threats team monitors global attacker behavior and delivers fast, high-confidence detections</b></li><li><b>What happens behind the scenes when a proof-of-concept drops (especially during holidays)</b></li><li><b>Why some CVEs remain “evergreen” targets and never truly go away</b></li><li><b>The balance between speed and accuracy in rule writing without overwhelming SOC teams</b></li><li><b>Where AI and machine learning are being used today to reduce tedious work and improve triage</b></li><li><b>The risks of over-automation, hallucinations, and untrusted intelligence in security workflows</b></li><li><b>What’s coming in 2026, including more frequent rule releases and more detection coverage</b></li></ul><p><br/></p><p><b>This episode offers a candid, practitioner-driven view of modern threat detection—highlighting why adaptability, transparency, and human expertise remain essential as defenders head into 2026.</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b><br/>Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Rich Gonzalez, Director of Emerging Threats at Proofpoint, to kick off 2026 with a behind-the-scenes look at how emerging threats are detected, tracked, and turned into real-world protections for defenders.</b></p><p><b>They explore what it really takes to keep pace with an always-on threat landscape, from rapid response to newly released proof-of-concepts, to why certain vulnerabilities like Log4j continue to dominate attacker activity years later. The conversation also digs into alert fatigue, the realities of SOC burnout, and where automation and AI can genuinely help versus where trust, accuracy, and human judgment still matter most.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>How Proofpoint’s Emerging Threats team monitors global attacker behavior and delivers fast, high-confidence detections</b></li><li><b>What happens behind the scenes when a proof-of-concept drops (especially during holidays)</b></li><li><b>Why some CVEs remain “evergreen” targets and never truly go away</b></li><li><b>The balance between speed and accuracy in rule writing without overwhelming SOC teams</b></li><li><b>Where AI and machine learning are being used today to reduce tedious work and improve triage</b></li><li><b>The risks of over-automation, hallucinations, and untrusted intelligence in security workflows</b></li><li><b>What’s coming in 2026, including more frequent rule releases and more detection coverage</b></li></ul><p><br/></p><p><b>This episode offers a candid, practitioner-driven view of modern threat detection—highlighting why adaptability, transparency, and human expertise remain essential as defenders head into 2026.</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18592306-emerging-threats-in-2026-inside-proofpoint-s-detection-playbook.mp3" length="32513709" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18592306</guid>
    <pubDate>Thu, 29 Jan 2026 15:00:00 -0500</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2445401/18592306/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome &amp; Kicking Off 2026" />
  <psc:chapter start="1:20" title="What “Emerging Threats” Actually Does" />
  <psc:chapter start="5:05" title="Dropping POCs on Holidays" />
  <psc:chapter start="7:46" title="From POC to Protection: How Fast Is Fast Enough?" />
  <psc:chapter start="13:40" title="Evergreen Vulnerabilities &amp; Why Log4j Never Dies" />
  <psc:chapter start="14:05" title="Alert Fatigue Is Still Real" />
  <psc:chapter start="16:30" title="AI in the SOC: Promise vs. Reality" />
  <psc:chapter start="20:15" title="Using AI Without Breaking Trust" />
  <psc:chapter start="24:30" title="AI Inside Emerging Threats" />
  <psc:chapter start="28:45" title="Threat Intel, Attribution, and Confidence" />
  <psc:chapter start="31:30" title="How AI Changes the Attacker Advantage" />
  <psc:chapter start="35:45" title="Preparing for 2026: What’s Changing" />
  <psc:chapter start="37:03" title="What to Be Excited About in 2026" />
  <psc:chapter start="38:50" title="Tailored Detection &amp; Curated Rule Sets" />
  <psc:chapter start="44:30" title="Final Thoughts &amp; Sign-Off" />
</psc:chapters>
    <itunes:duration>2706</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>94</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Operation EndOfYear: New Malware, Popular Tactics, and Where AI Is Taking Us</itunes:title>
    <title>Operation EndOfYear: New Malware, Popular Tactics, and Where AI Is Taking Us</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Elves! Host Selena Larson chats with Daniel Blackford, Vice President of Threat Research at Proofpoint, for an end-of-year look at how the cyber threat landscape evolved—and what defenders should be preparing for in 2026. They reflect on how the second half of 2025 brought meaningful shifts in attacker behavior, with familiar techniques becoming more professionalized and new malware emerging alongside identity-focused attacks. The conversation also exp...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Elves! Host Selena Larson chats with Daniel Blackford, Vice President of Threat Research at Proofpoint, for an end-of-year look at how the cyber threat landscape evolved—and what defenders should be preparing for in 2026.</b></p><p><b>They reflect on how the second half of 2025 brought meaningful shifts in attacker behavior, with familiar techniques becoming more professionalized and new malware emerging alongside identity-focused attacks. The conversation also explores why attribution is getting harder, how law enforcement disruptions are reshaping cybercrime ecosystems, and where AI is genuinely helping defenders versus introducing new risks.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>How attacker tactics “proliferated” in 2025 rather than fully reinvented<br/><br/></b><br/></li><li><b>The return of new malware families alongside loaders and backdoors<br/><br/></b><br/></li><li><b>Why identity, social engineering, and legitimate tools (RMMs, device code phishing) remain top attack vectors<br/><br/></b><br/></li><li><b>The real-world impact of law enforcement takedowns like Operation Endgame<br/><br/></b><br/></li><li><b>How shared tooling and services are blurring attribution across threat actors<br/><br/></b><br/></li><li><b>Practical, no-hype perspectives on AI, machine learning, and defender workflows<br/><br/></b><br/></li><li><b>What organizations should focus on now to stay resilient in 2026<br/><br/></b><br/></li></ul><p><b>This episode offers a grounded, experience-driven perspective on what actually mattered in 2025—and why strong fundamentals, layered defenses, and adaptability remain the best preparation for whatever comes next.</b></p><p><br/></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics'><b>https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys'><b>https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged'><b>https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged</b></a></p><p><a href='https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-ru-2025-1022.pdf'><b>https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-ru-2025-1022.pdf</b></a></p><p><a href='https://www.microsoft.com/en-us/research/wp-content/uploads/2025/01/lee_2025_ai_critical_thinking_survey.pdf'><b>https://www.microsoft.com/en-us/research/wp-content/uploads/2025/01/lee_2025_ai_critical_thinking_survey.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Elves! Host Selena Larson chats with Daniel Blackford, Vice President of Threat Research at Proofpoint, for an end-of-year look at how the cyber threat landscape evolved—and what defenders should be preparing for in 2026.</b></p><p><b>They reflect on how the second half of 2025 brought meaningful shifts in attacker behavior, with familiar techniques becoming more professionalized and new malware emerging alongside identity-focused attacks. The conversation also explores why attribution is getting harder, how law enforcement disruptions are reshaping cybercrime ecosystems, and where AI is genuinely helping defenders versus introducing new risks.</b></p><p><b>In this episode, they cover:</b></p><ul><li><b>How attacker tactics “proliferated” in 2025 rather than fully reinvented<br/><br/></b><br/></li><li><b>The return of new malware families alongside loaders and backdoors<br/><br/></b><br/></li><li><b>Why identity, social engineering, and legitimate tools (RMMs, device code phishing) remain top attack vectors<br/><br/></b><br/></li><li><b>The real-world impact of law enforcement takedowns like Operation Endgame<br/><br/></b><br/></li><li><b>How shared tooling and services are blurring attribution across threat actors<br/><br/></b><br/></li><li><b>Practical, no-hype perspectives on AI, machine learning, and defender workflows<br/><br/></b><br/></li><li><b>What organizations should focus on now to stay resilient in 2026<br/><br/></b><br/></li></ul><p><b>This episode offers a grounded, experience-driven perspective on what actually mattered in 2025—and why strong fundamentals, layered defenses, and adaptability remain the best preparation for whatever comes next.</b></p><p><br/></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics'><b>https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys'><b>https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged'><b>https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged</b></a></p><p><a href='https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-ru-2025-1022.pdf'><b>https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-ru-2025-1022.pdf</b></a></p><p><a href='https://www.microsoft.com/en-us/research/wp-content/uploads/2025/01/lee_2025_ai_critical_thinking_survey.pdf'><b>https://www.microsoft.com/en-us/research/wp-content/uploads/2025/01/lee_2025_ai_critical_thinking_survey.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18434985-operation-endofyear-new-malware-popular-tactics-and-where-ai-is-taking-us.mp3" length="40812088" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18434985</guid>
    <pubDate>Wed, 31 Dec 2025 04:00:00 -0500</pubDate>
    <itunes:duration>3397</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>93</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ho-Ho-Hold Up—Is That Message Real? Bad Santas Are Sending Seasonal Scams</itunes:title>
    <title>Ho-Ho-Hold Up—Is That Message Real? Bad Santas Are Sending Seasonal Scams</title>
    <itunes:summary><![CDATA[Send us fan mail! Happy Holidays to all our Cyber Pals! Host Selena Larson, and co-guest ho-ho-ho hosts, Tim Kromphardt &amp; Sarah Sabotka unwrap the surprising (and sometimes clever) ways cybercriminals use seasonal themes to trick both consumers and enterprises. From fake party invites and too-good-to-be-true discounts to holiday-flavored malware and RMM delivery, the team breaks down how threat actors capitalize on increased spending, lower vigilance, and year-end business pressure. They ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Happy Holidays to all our Cyber Pals!</p><p>Host Selena Larson, and co-guest ho-ho-ho hosts, Tim Kromphardt &amp; Sarah Sabotka unwrap the surprising (and sometimes clever) ways cybercriminals use seasonal themes to trick both consumers and enterprises.</p><p>From fake party invites and too-good-to-be-true discounts to holiday-flavored malware and RMM delivery, the team breaks down how threat actors capitalize on increased spending, lower vigilance, and year-end business pressure. They share real examples—like “free Christmas tree” scams, fake travel itineraries, smishing campaigns, and even malware hidden behind a Christmas caroling invitation.</p><p>You’ll also hear:</p><p>🎁 Why holiday-themed lures work so well<br/>🎁 How scammers tailor their tactics to shifting consumer behavior<br/> 🎁 The rise of SMS scams, malvertising, and SEO-poisoned shopping searches<br/> 🎁 What enterprises should watch for as employees mix work and personal activity<br/> 🎁 Why energy drinks are (shockingly) a hot commodity in cargo theft schemes<br/> 🎁 Practical tips to stay safe—whether you’re holiday shopping or closing year-end invoices</p><p>Before you head off for vacation, join us for a fun, insightful, and very festive breakdown of the seasonal threats that might be landing under your digital tree this year.</p><p><br/></p><p><br/></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Happy Holidays to all our Cyber Pals!</p><p>Host Selena Larson, and co-guest ho-ho-ho hosts, Tim Kromphardt &amp; Sarah Sabotka unwrap the surprising (and sometimes clever) ways cybercriminals use seasonal themes to trick both consumers and enterprises.</p><p>From fake party invites and too-good-to-be-true discounts to holiday-flavored malware and RMM delivery, the team breaks down how threat actors capitalize on increased spending, lower vigilance, and year-end business pressure. They share real examples—like “free Christmas tree” scams, fake travel itineraries, smishing campaigns, and even malware hidden behind a Christmas caroling invitation.</p><p>You’ll also hear:</p><p>🎁 Why holiday-themed lures work so well<br/>🎁 How scammers tailor their tactics to shifting consumer behavior<br/> 🎁 The rise of SMS scams, malvertising, and SEO-poisoned shopping searches<br/> 🎁 What enterprises should watch for as employees mix work and personal activity<br/> 🎁 Why energy drinks are (shockingly) a hot commodity in cargo theft schemes<br/> 🎁 Practical tips to stay safe—whether you’re holiday shopping or closing year-end invoices</p><p>Before you head off for vacation, join us for a fun, insightful, and very festive breakdown of the seasonal threats that might be landing under your digital tree this year.</p><p><br/></p><p><br/></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18320525-ho-ho-hold-up-is-that-message-real-bad-santas-are-sending-seasonal-scams.mp3" length="24448773" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18320525</guid>
    <pubDate>Tue, 09 Dec 2025 04:00:00 -0500</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2445401/18320525/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome &amp; Holiday Threat Rundown" />
  <psc:chapter start="2:03" title="Why Seasonal Lures Work So Well" />
  <psc:chapter start="3:00" title="Travel Scams and Fake Itineraries" />
  <psc:chapter start="5:40" title="Fake Deals, Discounts &amp; Shopping Scams" />
  <psc:chapter start="9:11" title="Cargo Theft &amp; The Energy Drink Surprise" />
  <psc:chapter start="10:15" title="RMM Delivery and Technical Threat Trends" />
  <psc:chapter start="14:41" title="Malvertising, SEO Poisoning &amp; Online Shopping Risks" />
  <psc:chapter start="20:05" title="Credential Fishing Techniques " />
  <psc:chapter start="28:45" title="Holiday-Themed Malware Examples" />
  <psc:chapter start="30:00" title="Tips to Stay Safe This Season" />
</psc:chapters>
    <itunes:duration>2034</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>92</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Toasters to Botnets: Securing Everyday IoT</itunes:title>
    <title>From Toasters to Botnets: Securing Everyday IoT</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities. From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Squirrels!</b></p><p><b>Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities.</b></p><p><b>From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and defenders cover hundreds of CVEs — from long-forgotten exploits to newly discovered zero-days.</b></p><p><b>The trio dives into:</b></p><ul><li><b>Why IoT devices remain a major attack vector for threat actors and botnets<br/><br/></b><br/></li><li><b>What kinds of vulnerabilities IoT Hunter detects (and how it’s </b><b><em>not</em></b><b> AI)<br/><br/></b><br/></li><li><b>The surprising persistence of outdated frameworks like Boa HTTPd<br/><br/></b><br/></li><li><b>Real-world examples of IoT exploitation — from ransomware via smart cameras to botnets made of toasters<br/><br/></b><br/></li><li><b>Practical steps anyone can take to secure home and small business devices<br/><br/></b><br/></li></ul><p><b>This episode uncovers the risks and realities behind our increasingly connected world — and how automation and community collaboration are helping defenders keep up.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='http://community.emergingthreats.net'><b>community.emergingthreats.net</b></a></p><p><a href='https://community.emergingthreats.net/t/iot-hunter-public-release/3024'>https://community.emergingthreats.net/t/iot-hunter-public-release/3024</a></p><p><a href='https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095'>https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095</a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Squirrels!</b></p><p><b>Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities.</b></p><p><b>From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and defenders cover hundreds of CVEs — from long-forgotten exploits to newly discovered zero-days.</b></p><p><b>The trio dives into:</b></p><ul><li><b>Why IoT devices remain a major attack vector for threat actors and botnets<br/><br/></b><br/></li><li><b>What kinds of vulnerabilities IoT Hunter detects (and how it’s </b><b><em>not</em></b><b> AI)<br/><br/></b><br/></li><li><b>The surprising persistence of outdated frameworks like Boa HTTPd<br/><br/></b><br/></li><li><b>Real-world examples of IoT exploitation — from ransomware via smart cameras to botnets made of toasters<br/><br/></b><br/></li><li><b>Practical steps anyone can take to secure home and small business devices<br/><br/></b><br/></li></ul><p><b>This episode uncovers the risks and realities behind our increasingly connected world — and how automation and community collaboration are helping defenders keep up.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='http://community.emergingthreats.net'><b>community.emergingthreats.net</b></a></p><p><a href='https://community.emergingthreats.net/t/iot-hunter-public-release/3024'>https://community.emergingthreats.net/t/iot-hunter-public-release/3024</a></p><p><a href='https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095'>https://community.emergingthreats.net/t/cybersecurity-awareness-month-iot-and-soho-devices/3095</a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18211662-from-toasters-to-botnets-securing-everyday-iot.mp3" length="27151655" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18211662</guid>
    <pubDate>Tue, 18 Nov 2025 10:00:00 -0500</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/2445401/18211662/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome to Proofpoint Discarded" />
  <psc:chapter start="1:07" title="What Is IoT Hunter?" />
  <psc:chapter start="2:30" title="Automation, Not AI" />
  <psc:chapter start="3:26" title="Defining IoT and Device Coverage" />
  <psc:chapter start="4:36" title="Old and New Vulnerabilities" />
  <psc:chapter start="6:28" title="Configurations vs. Exploits" />
  <psc:chapter start="7:47" title="Why Open Source IoT Hunter?" />
  <psc:chapter start="9:10" title="The Power of the Community" />
  <psc:chapter start="10:01" title="Unexpected Vulnerabilities in Automation Devices" />
  <psc:chapter start="13:15" title="Outdated Software in “New” Devices" />
  <psc:chapter start="14:55" title="When Smart Devices Go Wrong" />
  <psc:chapter start="16:26" title="Why IoT Devices Are Targeted" />
  <psc:chapter start="19:44" title="From Toasters to Botnets" />
  <psc:chapter start="22:21" title="Expanding Attack Surfaces" />
  <psc:chapter start="23:38" title="Practical Protection Tips" />
  <psc:chapter start="27:23" title="Sometimes Dumb Is Smart" />
</psc:chapters>
    <itunes:duration>2260</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>91</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Elect More Hackers: Tech Skills for Real-World Change</itunes:title>
    <title>Elect More Hackers: Tech Skills for Real-World Change</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Squirrels! Can hackers make great public servants?  Host Selena Larson, and co-guest hosts, Sarah Sabotka and Tim Kromphardt sit down with Andrew Brandt, Founder and Executive Director of Elect More Hackers — a nonprofit on a mission to get more cybersecurity and tech-minded thinkers into elected office. Together, they explore how hackers and technologists can bring their problem-solving mindset into civic life — from teaching digital safety at lo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Squirrels! Can hackers make great public servants? </p><p>Host Selena Larson, and co-guest hosts, Sarah Sabotka and Tim Kromphardt sit down with Andrew Brandt, Founder and Executive Director of Elect More Hackers — a nonprofit on a mission to get more cybersecurity and tech-minded thinkers into elected office.</p><p>Together, they explore how hackers and technologists can bring their problem-solving mindset into civic life — from teaching digital safety at local libraries to advising lawmakers on cyber hygiene, data privacy, and AI policy. Andrew unpacks why infosec professionals are uniquely equipped to tackle systemic issues like the “enshittification” of online platforms, the right-to-repair movement, and the privacy nightmare of “smart” cars.</p><p>The conversation dives into the surprising cybersecurity gaps in government, how social engineering and lobbying overlap, and why civic engagement shouldn’t stop at voting. You’ll also hear how even small acts — like community outreach or helping shape local school tech policies — can lead to smarter, safer public systems.</p><p>Whether you’re a hacker or a policy nerd this episode will inspire you to plug in locally, build trust, and maybe even run for office yourself.</p><p>🎙️ Tune in to learn:</p><ul><li>Why hackers and technologists make great problem-solvers in politics<br/><br/><br/></li><li>How policies like right-to-repair and data privacy affect everyone<br/><br/><br/></li><li>Practical ways cybersecurity professionals can engage civically — even without running for office<br/><br/><br/></li></ul><p>Think civic engagement isn’t for you? Think again — this conversation shows how even small actions from tech-minded thinkers can create big change.</p><p><br/></p><p>Resources Mentioned:</p><p><br/></p><p>🔗 Learn more:<a href='https://electmorehackers.com'> electmorehackers.com</a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Squirrels! Can hackers make great public servants? </p><p>Host Selena Larson, and co-guest hosts, Sarah Sabotka and Tim Kromphardt sit down with Andrew Brandt, Founder and Executive Director of Elect More Hackers — a nonprofit on a mission to get more cybersecurity and tech-minded thinkers into elected office.</p><p>Together, they explore how hackers and technologists can bring their problem-solving mindset into civic life — from teaching digital safety at local libraries to advising lawmakers on cyber hygiene, data privacy, and AI policy. Andrew unpacks why infosec professionals are uniquely equipped to tackle systemic issues like the “enshittification” of online platforms, the right-to-repair movement, and the privacy nightmare of “smart” cars.</p><p>The conversation dives into the surprising cybersecurity gaps in government, how social engineering and lobbying overlap, and why civic engagement shouldn’t stop at voting. You’ll also hear how even small acts — like community outreach or helping shape local school tech policies — can lead to smarter, safer public systems.</p><p>Whether you’re a hacker or a policy nerd this episode will inspire you to plug in locally, build trust, and maybe even run for office yourself.</p><p>🎙️ Tune in to learn:</p><ul><li>Why hackers and technologists make great problem-solvers in politics<br/><br/><br/></li><li>How policies like right-to-repair and data privacy affect everyone<br/><br/><br/></li><li>Practical ways cybersecurity professionals can engage civically — even without running for office<br/><br/><br/></li></ul><p>Think civic engagement isn’t for you? Think again — this conversation shows how even small actions from tech-minded thinkers can create big change.</p><p><br/></p><p>Resources Mentioned:</p><p><br/></p><p>🔗 Learn more:<a href='https://electmorehackers.com'> electmorehackers.com</a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18133725-elect-more-hackers-tech-skills-for-real-world-change.mp3" length="39407561" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18133725</guid>
    <pubDate>Tue, 04 Nov 2025 15:00:00 -0500</pubDate>
    <itunes:duration>3281</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Web Injects to Info Stealers: How Cybercriminals Stay Ahead</itunes:title>
    <title>From Web Injects to Info Stealers: How Cybercriminals Stay Ahead</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Sleuths! Host Selena Larson, and guest host, Sarah Sabotka take you behind the scenes of the ever-changing world of cybercrime—where attackers innovate, scams evolve, and staying one step ahead is a constant challenge. From remote monitoring and management (RMM) abuse to adversary-in-the-middle (AiTM) phishing, web injects, flashy malware lures, and the latest wave of information stealers, we unpack the tactics, techniques, and procedures shaping today...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Sleuths! Host Selena Larson, and guest host, Sarah Sabotka take you behind the scenes of the ever-changing world of cybercrime—where attackers innovate, scams evolve, and staying one step ahead is a constant challenge.</b></p><p><b>From remote monitoring and management (RMM) abuse to adversary-in-the-middle (AiTM) phishing, web injects, flashy malware lures, and the latest wave of information stealers, we unpack the tactics, techniques, and procedures shaping today’s threat landscape.</b></p><p><b>We talk about:</b></p><ul><li><b>Why attackers are leaning on RMM tools and what you can do to defend yourself or your organization.</b></li><li><b>How MFA-aware phishing kits are evolving and ways to stay secure.</b></li><li><b>New information stealers emerging in the wake of law enforcement disruptions.</b></li><li><b>The role Reddit can play in helping spot real-world scams.</b></li><li><b>The human side of cyber crime, from fraud and job scams to societal pressures driving people into schemes.</b></li><li><b>The exponential growth of web injects and unique social engineering</b></li><li><b>The cunning tactics of threat actors like TA582<br/><br/></b><br/></li></ul><p><b>Along the way, we share practical tips for staying safe online—closing suspicious tabs, using MFA, blocking unsolicited links, and even taking mindful breaks from the digital world. </b></p><p><b>This episode helps you understand the chaos of the digital underworld and stay one step ahead—without throwing your phone into the woods.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice'><b>https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/when-monster-bytes-tracking-ta585-and-its-arsenal'><b>https://www.proofpoint.com/us/blog/threat-insight/when-monster-bytes-tracking-ta585-and-its-arsenal</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication'><b>https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication</b></a></p><p><a href='https://www.ftc.gov/system/files/ftc_gov/pdf/csn-annual-data-book-2024.pdf'><b>https://www.ftc.gov/system/files/ftc_gov/pdf/csn-annual-data-book-2024.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Sleuths! Host Selena Larson, and guest host, Sarah Sabotka take you behind the scenes of the ever-changing world of cybercrime—where attackers innovate, scams evolve, and staying one step ahead is a constant challenge.</b></p><p><b>From remote monitoring and management (RMM) abuse to adversary-in-the-middle (AiTM) phishing, web injects, flashy malware lures, and the latest wave of information stealers, we unpack the tactics, techniques, and procedures shaping today’s threat landscape.</b></p><p><b>We talk about:</b></p><ul><li><b>Why attackers are leaning on RMM tools and what you can do to defend yourself or your organization.</b></li><li><b>How MFA-aware phishing kits are evolving and ways to stay secure.</b></li><li><b>New information stealers emerging in the wake of law enforcement disruptions.</b></li><li><b>The role Reddit can play in helping spot real-world scams.</b></li><li><b>The human side of cyber crime, from fraud and job scams to societal pressures driving people into schemes.</b></li><li><b>The exponential growth of web injects and unique social engineering</b></li><li><b>The cunning tactics of threat actors like TA582<br/><br/></b><br/></li></ul><p><b>Along the way, we share practical tips for staying safe online—closing suspicious tabs, using MFA, blocking unsolicited links, and even taking mindful breaks from the digital world. </b></p><p><b>This episode helps you understand the chaos of the digital underworld and stay one step ahead—without throwing your phone into the woods.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice'><b>https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/when-monster-bytes-tracking-ta585-and-its-arsenal'><b>https://www.proofpoint.com/us/blog/threat-insight/when-monster-bytes-tracking-ta585-and-its-arsenal</b></a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication'><b>https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication</b></a></p><p><a href='https://www.ftc.gov/system/files/ftc_gov/pdf/csn-annual-data-book-2024.pdf'><b>https://www.ftc.gov/system/files/ftc_gov/pdf/csn-annual-data-book-2024.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/18051686-from-web-injects-to-info-stealers-how-cybercriminals-stay-ahead.mp3" length="43870742" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18051686</guid>
    <pubDate>Tue, 21 Oct 2025 14:00:00 -0400</pubDate>
    <itunes:duration>3653</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>89</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Being Aware of Cybersecurity Means Knowing You&#39;re Human</itunes:title>
    <title>When Being Aware of Cybersecurity Means Knowing You&#39;re Human</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Pumpkin Spice Cyber Friends! It’s Cybersecurity Awareness Month — and what better way to kick it off than with a deep dive into the human side of cyber threats? In this episode host Selena Larson welcomes back guest and part-time co-host Sarah Sabotka, our “Cybersecurity Awareness Month Queen” and Staff Threat Researcher at Proofpoint. She joins us to break down why social engineering is at the heart of so many attacks. We take a closer look at how scams and...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Pumpkin Spice Cyber Friends! It’s Cybersecurity Awareness Month — and what better way to kick it off than with a deep dive into the human side of cyber threats? In this episode host Selena Larson welcomes back guest and part-time co-host Sarah Sabotka, our “Cybersecurity Awareness Month Queen” and Staff Threat Researcher at Proofpoint. She joins us to break down why social engineering is at the heart of so many attacks.</p><p>We take a closer look at how scams and social engineering tactics are growing more sophisticated—and how the real battleground isn’t just your inbox, it’s your brain. Our guest explains “amygdala hijacking,” the psychological manipulation behind scams, and why recognizing your emotional responses during suspicious interactions can be just as important as spotting technical red flags. </p><p>We also focus on protecting some of the most vulnerable—seniors and young digital natives—highlighting community education programs, interactive teen cybersecurity trainings, and strategies for safe social media use, password hygiene, and multi-factor authentication.</p><p>We also talk about:</p><ul><li>Why Awareness Month feels different this year and how communicators are packaging complex threat research for real people.<br/><br/></li><li>The neuroscience behind social engineering (shoutout to Dr. Bob, Proofpoint’s lead cognitive scientist) and a simple, powerful takeaway: trust your gut.<br/><br/></li><li>Concrete examples: ClickFix scams, deepfakes used against small businesses, LLM-enabled phishing, benign-conversation lures (smishing &amp; job scams), and multi-step attacks that prime victims over time.<br/><br/></li><li>Practical steps to protect yourself and your org — safe words, pause-and-check habits, and why peer stories beat scary slides.<br/><br/></li></ul><p>Tune in and learn how to build better cyber awareness for everyone in your life—because cybersecurity isn’t just for IT teams, it’s for all of us.</p><p>Resources Mentioned:</p><p><a href='https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering'>https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering</a></p><p><a href='https://www.proofpoint.com/us/blog/security-awareness-training'>https://www.proofpoint.com/us/blog/security-awareness-training</a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a></p><p><a href='https://www.clickorlando.com/news/local/2025/02/19/central-florida-wildlife-rescue-falls-victim-to-podcast-scam-warns-others/'>https://www.clickorlando.com/news/local/2025/02/19/central-florida-wildlife-rescue-falls-victim-to-podcast-scam-warns-others/</a></p><p><a href='https://abc7.com/post/scam-texts-targeting-people-looking-jobs-are-rise-ftc-warns/17838427/'>https://abc7.com/post/scam-texts-targeting-people-looking-jobs-are-rise-ftc-warns/17838427/</a></p><p><a href='https://www.cbc.ca/news/marketplace/sextortion-teen-boys-canada-1.7648267'>https://www.cbc.ca/news/marketplace/sextortion-teen-boys-canada-1.7648267</a></p><p><a href='https://www.consumerreports.org/media-room/press-releases/2025/10/consumer-reports-study-finds-surge-in-texting-and-messaging-scams'>https://www.consumerreports.org/media-room/press-releases/2025/10/consumer-reports-study-finds-surge-in-texting-and-messaging-scams</a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Pumpkin Spice Cyber Friends! It’s Cybersecurity Awareness Month — and what better way to kick it off than with a deep dive into the human side of cyber threats? In this episode host Selena Larson welcomes back guest and part-time co-host Sarah Sabotka, our “Cybersecurity Awareness Month Queen” and Staff Threat Researcher at Proofpoint. She joins us to break down why social engineering is at the heart of so many attacks.</p><p>We take a closer look at how scams and social engineering tactics are growing more sophisticated—and how the real battleground isn’t just your inbox, it’s your brain. Our guest explains “amygdala hijacking,” the psychological manipulation behind scams, and why recognizing your emotional responses during suspicious interactions can be just as important as spotting technical red flags. </p><p>We also focus on protecting some of the most vulnerable—seniors and young digital natives—highlighting community education programs, interactive teen cybersecurity trainings, and strategies for safe social media use, password hygiene, and multi-factor authentication.</p><p>We also talk about:</p><ul><li>Why Awareness Month feels different this year and how communicators are packaging complex threat research for real people.<br/><br/></li><li>The neuroscience behind social engineering (shoutout to Dr. Bob, Proofpoint’s lead cognitive scientist) and a simple, powerful takeaway: trust your gut.<br/><br/></li><li>Concrete examples: ClickFix scams, deepfakes used against small businesses, LLM-enabled phishing, benign-conversation lures (smishing &amp; job scams), and multi-step attacks that prime victims over time.<br/><br/></li><li>Practical steps to protect yourself and your org — safe words, pause-and-check habits, and why peer stories beat scary slides.<br/><br/></li></ul><p>Tune in and learn how to build better cyber awareness for everyone in your life—because cybersecurity isn’t just for IT teams, it’s for all of us.</p><p>Resources Mentioned:</p><p><a href='https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering'>https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering</a></p><p><a href='https://www.proofpoint.com/us/blog/security-awareness-training'>https://www.proofpoint.com/us/blog/security-awareness-training</a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a></p><p><a href='https://www.clickorlando.com/news/local/2025/02/19/central-florida-wildlife-rescue-falls-victim-to-podcast-scam-warns-others/'>https://www.clickorlando.com/news/local/2025/02/19/central-florida-wildlife-rescue-falls-victim-to-podcast-scam-warns-others/</a></p><p><a href='https://abc7.com/post/scam-texts-targeting-people-looking-jobs-are-rise-ftc-warns/17838427/'>https://abc7.com/post/scam-texts-targeting-people-looking-jobs-are-rise-ftc-warns/17838427/</a></p><p><a href='https://www.cbc.ca/news/marketplace/sextortion-teen-boys-canada-1.7648267'>https://www.cbc.ca/news/marketplace/sextortion-teen-boys-canada-1.7648267</a></p><p><a href='https://www.consumerreports.org/media-room/press-releases/2025/10/consumer-reports-study-finds-surge-in-texting-and-messaging-scams'>https://www.consumerreports.org/media-room/press-releases/2025/10/consumer-reports-study-finds-surge-in-texting-and-messaging-scams</a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17978329-when-being-aware-of-cybersecurity-means-knowing-you-re-human.mp3" length="34881713" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17978329</guid>
    <pubDate>Wed, 08 Oct 2025 13:00:00 -0400</pubDate>
    <itunes:duration>2904</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>88</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hot sauce and hot takes: An Only Malware in the Building special</itunes:title>
    <title>Hot sauce and hot takes: An Only Malware in the Building special</title>
    <itunes:summary><![CDATA[Send us fan mail! Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cyb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Welcome in! You’ve entered, <em>Only Malware in the Building</em> — but this time, it’s not just another episode. This is a special edition you won’t want to miss.</p><p>For the first time, our hosts are together <em>in-studio</em> — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠<a href='https://www.linkedin.com/in/selenalarson/'>⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href='https://www.proofpoint.com/'>⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href='https://www.proofpoint.com/us/podcasts/discarded'>⁠⁠⁠⁠⁠⁠DISCARDED⁠</a>, along with <a href='https://www.n2k.com/?__hstc=223811332.028e635ef600b7113291f001f53b0a3c.1758647357813.1758647357813.1758651412861.2&amp;__hssc=223811332.1.1758651412861&amp;__hsfp=1286964747'>⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href='https://www.linkedin.com/in/keith-mularski-b737551/'>⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href='https://www.linkedin.com/company/qintel/'>⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat.</p><p>This one’s too good for audio alone — you’ll want to watch the full <a href='https://youtu.be/HDgLBxEKx28'>⁠video⁠</a> edition to catch every spicy reaction, every laugh, and maybe even a few tears.</p><p>So grab your milk, get ready to feel the burn, and come join us for this special hot take on <em>Only Malware in the Building.</em></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Welcome in! You’ve entered, <em>Only Malware in the Building</em> — but this time, it’s not just another episode. This is a special edition you won’t want to miss.</p><p>For the first time, our hosts are together <em>in-studio</em> — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠<a href='https://www.linkedin.com/in/selenalarson/'>⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href='https://www.proofpoint.com/'>⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href='https://www.proofpoint.com/us/podcasts/discarded'>⁠⁠⁠⁠⁠⁠DISCARDED⁠</a>, along with <a href='https://www.n2k.com/?__hstc=223811332.028e635ef600b7113291f001f53b0a3c.1758647357813.1758647357813.1758651412861.2&amp;__hssc=223811332.1.1758651412861&amp;__hsfp=1286964747'>⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href='https://www.linkedin.com/in/keith-mularski-b737551/'>⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href='https://www.linkedin.com/company/qintel/'>⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat.</p><p>This one’s too good for audio alone — you’ll want to watch the full <a href='https://youtu.be/HDgLBxEKx28'>⁠video⁠</a> edition to catch every spicy reaction, every laugh, and maybe even a few tears.</p><p>So grab your milk, get ready to feel the burn, and come join us for this special hot take on <em>Only Malware in the Building.</em></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17893458-hot-sauce-and-hot-takes-an-only-malware-in-the-building-special.mp3" length="25057991" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17893458</guid>
    <pubDate>Tue, 23 Sep 2025 14:00:00 -0400</pubDate>
    <itunes:duration>2085</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>87</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Freighty Cats: RFQ Phishing Comes to A Warehouse Near You</itunes:title>
    <title>Freighty Cats: RFQ Phishing Comes to A Warehouse Near You</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Stars! In this episode host Selena Larson welcomes back guest and part-time co-host Tim Kromphardt, fresh from DEFCON, to explore the world of request-for-quote (RFQ) fraud—a growing scam targeting small- to medium-sized businesses with fake purchase requests and net financing schemes. Tim explains how cybercriminals exploit legitimate business practices to steal physical goods like networking tools, surveillance equipment, and medical devices. Using s...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Stars! In this episode host Selena Larson welcomes back guest and part-time co-host Tim Kromphardt, fresh from DEFCON, to explore the world of request-for-quote (RFQ) fraud—a growing scam targeting small- to medium-sized businesses with fake purchase requests and net financing schemes.</p><p>Tim explains how cybercriminals exploit legitimate business practices to steal physical goods like networking tools, surveillance equipment, and medical devices. Using stolen business credentials, fake domains, and freight forwarding services, these scams combine social engineering with real-world theft. He shares firsthand stories of engaging with scammers directly, taking down fraudulent domains in real time, and even halting shipments in transit.</p><p>Selena and Tim break down how these schemes operate, the sophistication of scammers and why smaller, specialized companies are often targeted. They also provide practical tips for spotting and avoiding these scams, from verifying domains and emails to independently confirming contacts and addresses.</p><p><br/></p><p>Resources Mentioned:</p><p>https://www.proofpoint.com/us/blog/threat-insight/net-rfq-request-quote-scammers-casting-wide-net-steal-real-goods</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Stars! In this episode host Selena Larson welcomes back guest and part-time co-host Tim Kromphardt, fresh from DEFCON, to explore the world of request-for-quote (RFQ) fraud—a growing scam targeting small- to medium-sized businesses with fake purchase requests and net financing schemes.</p><p>Tim explains how cybercriminals exploit legitimate business practices to steal physical goods like networking tools, surveillance equipment, and medical devices. Using stolen business credentials, fake domains, and freight forwarding services, these scams combine social engineering with real-world theft. He shares firsthand stories of engaging with scammers directly, taking down fraudulent domains in real time, and even halting shipments in transit.</p><p>Selena and Tim break down how these schemes operate, the sophistication of scammers and why smaller, specialized companies are often targeted. They also provide practical tips for spotting and avoiding these scams, from verifying domains and emails to independently confirming contacts and addresses.</p><p><br/></p><p>Resources Mentioned:</p><p>https://www.proofpoint.com/us/blog/threat-insight/net-rfq-request-quote-scammers-casting-wide-net-steal-real-goods</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17812327-freighty-cats-rfq-phishing-comes-to-a-warehouse-near-you.mp3" length="25763397" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17812327</guid>
    <pubDate>Tue, 09 Sep 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2144</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>86</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Direct Send Exploitation &amp; URL Rewrite Attacks: What Security Teams Must Know</itunes:title>
    <title>Direct Send Exploitation &amp; URL Rewrite Attacks: What Security Teams Must Know</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Squirrels! In this extra-packed episode of Discarded, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending against them requires more than just traditional email security. Jason explains what Direct Send is, why attackers exploit this legacy feature, and how...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Squirrels! In this extra-packed episode of </b><b><em>Discarded</em></b><b>, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending against them requires more than just traditional email security.</b></p><p><b>Jason explains what Direct Send is, why attackers exploit this legacy feature, and how it enables phishing campaigns that appear to originate from inside an organization. From QR code phishing kits to “to-do list” themed lures, Selena and Jason break down attack chains, share real-world examples, and highlight the red flags that indicate exploitation. </b>They also explore how adversaries weaponize URL rewrites in redirect chains, to deliver malware and credential phishing. </p><p><br/></p><p><b>We also unpack:</b></p><ul><li><b> How Direct Send works under the hood and why legacy features are a prime target<br/><br/></b><br/></li><li><b>Common signs in email headers that reveal Direct Send abuse<br/><br/></b><br/></li><li><b>The role of URL rewrites in modern phishing campaigns<br/><br/></b><br/></li><li><b>Why credential phishing has overtaken malware as the go-to tactic<br/><br/></b><br/></li><li><b>Practical steps organizations can take—including when it makes sense to disable Direct Send<br/><br/></b><br/></li><li><b>The importance of layered defenses, user education, and risk awareness across SaaS apps<br/><br/></b><br/></li><li><b>Predictions on which “old school” techniques might resurface next</b></li></ul><p><br/></p><p><b>This episode offers a clear, actionable look at how threat actors adapt and why everything old in cybercrime eventually becomes new again. </b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p>https://www.proofpoint.com/us/blog/email-and-cloud-threats/attackers-abuse-m365-for-internal-phishing</p><p><a href='http://www.jasonsford.com'>http://www.jasonsford.com</a></p><p><a href='https://github.com/jasonsford/directsendanalyzer'>https://github.com/jasonsford/directsendanalyzer</a> </p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Squirrels! In this extra-packed episode of </b><b><em>Discarded</em></b><b>, host Selena Larson welcomes Proofpoint Principal Research Engineer Jason Ford for his first appearance on the show. Together, they dive into two resurging email attack techniques—Microsoft 365 Direct Send abuse and URL rewrite abuse—and why defending against them requires more than just traditional email security.</b></p><p><b>Jason explains what Direct Send is, why attackers exploit this legacy feature, and how it enables phishing campaigns that appear to originate from inside an organization. From QR code phishing kits to “to-do list” themed lures, Selena and Jason break down attack chains, share real-world examples, and highlight the red flags that indicate exploitation. </b>They also explore how adversaries weaponize URL rewrites in redirect chains, to deliver malware and credential phishing. </p><p><br/></p><p><b>We also unpack:</b></p><ul><li><b> How Direct Send works under the hood and why legacy features are a prime target<br/><br/></b><br/></li><li><b>Common signs in email headers that reveal Direct Send abuse<br/><br/></b><br/></li><li><b>The role of URL rewrites in modern phishing campaigns<br/><br/></b><br/></li><li><b>Why credential phishing has overtaken malware as the go-to tactic<br/><br/></b><br/></li><li><b>Practical steps organizations can take—including when it makes sense to disable Direct Send<br/><br/></b><br/></li><li><b>The importance of layered defenses, user education, and risk awareness across SaaS apps<br/><br/></b><br/></li><li><b>Predictions on which “old school” techniques might resurface next</b></li></ul><p><br/></p><p><b>This episode offers a clear, actionable look at how threat actors adapt and why everything old in cybercrime eventually becomes new again. </b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p>https://www.proofpoint.com/us/blog/email-and-cloud-threats/attackers-abuse-m365-for-internal-phishing</p><p><a href='http://www.jasonsford.com'>http://www.jasonsford.com</a></p><p><a href='https://github.com/jasonsford/directsendanalyzer'>https://github.com/jasonsford/directsendanalyzer</a> </p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><b><br/><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17731824-direct-send-exploitation-url-rewrite-attacks-what-security-teams-must-know.mp3" length="31051438" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17731824</guid>
    <pubDate>Tue, 26 Aug 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2585</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>85</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Phish, Chips &amp; Voldemort: Inside China’s Cyber Targeting of Taiwan</itunes:title>
    <title>Phish, Chips &amp; Voldemort: Inside China’s Cyber Targeting of Taiwan</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Panda Bears! In this extra-packed episode of Discarded, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors are using to get in. Mark walks us through Proofpoint’s latest research on custom malware (yes, “Voldemort” is back), threat clusters with pun-fill...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Panda Bears! In this extra-packed episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors are using to get in.</b></p><p><b>Mark walks us through Proofpoint’s latest research on custom malware (yes, “Voldemort” is back), threat clusters with pun-filled names like UNK_SparkyCarp and UNK_DropPitch, and why Taiwan’s chip industry has become such a hot target. From design and manufacturing to financial analysts and supply chains, Chinese state-aligned actors are getting more creative—and more persistent.</b></p><p><b>We also unpack:</b></p><ul><li><b> The “Phish &amp; Chips” campaign and how it fits into China’s broader geopolitical strategy<br/><br/></b><br/></li><li><b> Why pop culture references like Voldemort and Mr. Robot keep showing up in espionage infrastructure<br/><br/></b><br/></li><li><b>Attribution headaches, including Proofpoint’s tracking of multiple unattributed threat clusters with UNK designators<br/><br/></b><br/></li><li><b> How AI, LLMs, and adversary-in-the-middle phishing are influencing espionage tactics<br/><br/></b><br/></li><li><b> The use of RMM tools and spoofed MacOS folders for stealth<br/><br/></b><br/></li><li><b> Why basic backdoors are making a strategic comeback<br/><br/></b><br/></li><li><b> A threat intel team’s deep love for vegetables, puns, and report titles<br/><br/></b><br/></li></ul><p><b>Whether you&apos;re tracking state-sponsored cyber activity, curious about weird malware names, or just here for the expert banter, this episode has you covered.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting'><b><em>Phish &amp; Chips: Chinese Espionage Activity Targeting Taiwan&apos;s Semiconductor Ecosystem</em></b></a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Panda Bears! In this extra-packed episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and guest host, Sarah Sabotka reunite with Staff Threat Researcher Mark Kelly to dive deep into China-aligned espionage activity—this time with a focus on Taiwan’s semiconductor ecosystem and the strange, stealthy tools threat actors are using to get in.</b></p><p><b>Mark walks us through Proofpoint’s latest research on custom malware (yes, “Voldemort” is back), threat clusters with pun-filled names like UNK_SparkyCarp and UNK_DropPitch, and why Taiwan’s chip industry has become such a hot target. From design and manufacturing to financial analysts and supply chains, Chinese state-aligned actors are getting more creative—and more persistent.</b></p><p><b>We also unpack:</b></p><ul><li><b> The “Phish &amp; Chips” campaign and how it fits into China’s broader geopolitical strategy<br/><br/></b><br/></li><li><b> Why pop culture references like Voldemort and Mr. Robot keep showing up in espionage infrastructure<br/><br/></b><br/></li><li><b>Attribution headaches, including Proofpoint’s tracking of multiple unattributed threat clusters with UNK designators<br/><br/></b><br/></li><li><b> How AI, LLMs, and adversary-in-the-middle phishing are influencing espionage tactics<br/><br/></b><br/></li><li><b> The use of RMM tools and spoofed MacOS folders for stealth<br/><br/></b><br/></li><li><b> Why basic backdoors are making a strategic comeback<br/><br/></b><br/></li><li><b> A threat intel team’s deep love for vegetables, puns, and report titles<br/><br/></b><br/></li></ul><p><b>Whether you&apos;re tracking state-sponsored cyber activity, curious about weird malware names, or just here for the expert banter, this episode has you covered.</b></p><p><br/></p><p><b>Resources Mentioned:</b></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting'><b><em>Phish &amp; Chips: Chinese Espionage Activity Targeting Taiwan&apos;s Semiconductor Ecosystem</em></b></a></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17655229-phish-chips-voldemort-inside-china-s-cyber-targeting-of-taiwan.mp3" length="30911693" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17655229</guid>
    <pubDate>Tue, 12 Aug 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2573</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>84</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Actor Theater: TA2541, TA558, and the Cyber Heist Crew TA582</itunes:title>
    <title>Threat Actor Theater: TA2541, TA558, and the Cyber Heist Crew TA582</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our cyber pals! In this episode of Discarded, host Selena Larson and co-host, Tim Kromphardt, are joined by Joe Wise, Senior Threat Researcher at Proofpoint for a deep dive into the chaotic brilliance of mid-tier eCrime actors—including the elusive TA582. We explore recent activity from TA2541 and TA558—two groups known for their uncanny consistency and precision targeting—before shifting focus to TA582: a standout in today’s threat landscape. TA582’s multilayer...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our cyber pals! In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host, Tim Kromphardt, are joined by Joe Wise, Senior Threat Researcher at Proofpoint for a deep dive into the chaotic brilliance of mid-tier eCrime actors—including the elusive TA582.</b></p><p><b>We explore recent activity from TA2541 and TA558—two groups known for their uncanny consistency and precision targeting—before shifting focus to TA582: a standout in today’s threat landscape. TA582’s multilayered, region-specific lures (think vintage car sales and fake speeding tickets) and complex delivery models are impressive compared to your typical cybercriminal.</b></p><p><b>Topics Include:</b></p><p><b>🔍 What you’ll hear:</b></p><ul><li><b>How TA2541 and TA558 maintain eerily consistent lures and targeting year after year<br/><br/></b><br/></li><li><b>The regional flavor behind lures in Latin America and Europe—especially during tax season<br/><br/></b><br/></li><li><b>Why TA582 feels like a digital jigsaw puzzle, with simultaneous email, web inject, and compromised site vectors<br/><br/></b><br/></li><li><b>A breakdown of TA582’s evolving payloads, from GhostWeaver to Interlock RAT<br/><br/></b><br/></li><li><b>The surprising links between threat actor collaboration, initial access brokers, and shifting loader trends<br/><br/></b><br/></li><li><b>How weird or silly variable names can enable threat actor tracking</b></li><li><b>And yes—13 URLs that needs the Tron soundtrack playing in the background to explore</b></li></ul><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our cyber pals! In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host, Tim Kromphardt, are joined by Joe Wise, Senior Threat Researcher at Proofpoint for a deep dive into the chaotic brilliance of mid-tier eCrime actors—including the elusive TA582.</b></p><p><b>We explore recent activity from TA2541 and TA558—two groups known for their uncanny consistency and precision targeting—before shifting focus to TA582: a standout in today’s threat landscape. TA582’s multilayered, region-specific lures (think vintage car sales and fake speeding tickets) and complex delivery models are impressive compared to your typical cybercriminal.</b></p><p><b>Topics Include:</b></p><p><b>🔍 What you’ll hear:</b></p><ul><li><b>How TA2541 and TA558 maintain eerily consistent lures and targeting year after year<br/><br/></b><br/></li><li><b>The regional flavor behind lures in Latin America and Europe—especially during tax season<br/><br/></b><br/></li><li><b>Why TA582 feels like a digital jigsaw puzzle, with simultaneous email, web inject, and compromised site vectors<br/><br/></b><br/></li><li><b>A breakdown of TA582’s evolving payloads, from GhostWeaver to Interlock RAT<br/><br/></b><br/></li><li><b>The surprising links between threat actor collaboration, initial access brokers, and shifting loader trends<br/><br/></b><br/></li><li><b>How weird or silly variable names can enable threat actor tracking</b></li><li><b>And yes—13 URLs that needs the Tron soundtrack playing in the background to explore</b></li></ul><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17576627-threat-actor-theater-ta2541-ta558-and-the-cyber-heist-crew-ta582.mp3" length="27329301" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17576627</guid>
    <pubDate>Tue, 29 Jul 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2274</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>83</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>10 Things I Hate About Attribution: A Clustering Conundrum </itunes:title>
    <title>10 Things I Hate About Attribution: A Clustering Conundrum </title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our cyber detectives and pedantic CTI friends! In this episode of Discarded, host Selena Larson is joined by Greg Lesnewich, Staff Threat Researcher at Proofpoint for a behind-the-scenes look at one of the most frustratingly fascinating attribution cases yet. What begins as a lighthearted rant: “10 Things I Hate About Attribution,” quickly turns into a deep dive into the murky overlap between TA829 (aka RomCom), TA289, and the elusive GreenSec cluster. From Tran...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our cyber detectives and pedantic CTI friends! In this episode of <em>Discarded</em>, host Selena Larson is joined by Greg Lesnewich, Staff Threat Researcher at Proofpoint for a behind-the-scenes look at one of the most frustratingly fascinating attribution cases yet.</p><p>What begins as a lighthearted rant: <em>“10 Things I Hate About Attribution,” </em>quickly turns into a deep dive into the murky overlap between TA829 (aka RomCom), TA289, and the elusive GreenSec cluster. From TransferLoader and malware panels to REM proxy infrastructure and attack chain similarities, Greg and Selena dissect the breadcrumb trail that led to a 25-page blog, a mountain of malware chains (Dusty Hammock? Single Camper?), and an attribution headache. </p><p><br/></p><p>Topics Include:</p><ul><li>TA829 (aka RomCom) and the elusive GreenSec cluster: What’s the difference?<br/><br/><br/></li><li>Vertical targeting overlap (and divergence)<br/><br/><br/></li><li>Malware breakdown: TransferLoader vs. RomCom and related malware<br/><br/><br/></li><li>Use of REM proxy and rebrand.ly infrastructure<br/><br/><br/></li><li>Attribution logic and the perils of shared tooling<br/><br/><br/></li><li>Bonus: Existential mysteries and karaoke mic commentary</li></ul><p><br/></p><p>The attribution game isn’t always about getting it right—it’s about asking better questions. Join us in the mess, and keep connecting the dots.</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our cyber detectives and pedantic CTI friends! In this episode of <em>Discarded</em>, host Selena Larson is joined by Greg Lesnewich, Staff Threat Researcher at Proofpoint for a behind-the-scenes look at one of the most frustratingly fascinating attribution cases yet.</p><p>What begins as a lighthearted rant: <em>“10 Things I Hate About Attribution,” </em>quickly turns into a deep dive into the murky overlap between TA829 (aka RomCom), TA289, and the elusive GreenSec cluster. From TransferLoader and malware panels to REM proxy infrastructure and attack chain similarities, Greg and Selena dissect the breadcrumb trail that led to a 25-page blog, a mountain of malware chains (Dusty Hammock? Single Camper?), and an attribution headache. </p><p><br/></p><p>Topics Include:</p><ul><li>TA829 (aka RomCom) and the elusive GreenSec cluster: What’s the difference?<br/><br/><br/></li><li>Vertical targeting overlap (and divergence)<br/><br/><br/></li><li>Malware breakdown: TransferLoader vs. RomCom and related malware<br/><br/><br/></li><li>Use of REM proxy and rebrand.ly infrastructure<br/><br/><br/></li><li>Attribution logic and the perils of shared tooling<br/><br/><br/></li><li>Bonus: Existential mysteries and karaoke mic commentary</li></ul><p><br/></p><p>The attribution game isn’t always about getting it right—it’s about asking better questions. Join us in the mess, and keep connecting the dots.</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17506414-10-things-i-hate-about-attribution-a-clustering-conundrum.mp3" length="40640522" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17506414</guid>
    <pubDate>Tue, 15 Jul 2025 04:00:00 -0400</pubDate>
    <itunes:duration>3384</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>82</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook</itunes:title>
    <title>Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! In this episode of Discarded, host Selena Larson and co-host Sara Sabotka are joined by Saher Naumaan and Greg Lesnewich, teammates on the espionage threat research team at Proofpoint to unravel the multifaceted—and often bizarre—world of North Korean cyber operations.    The team explores: What sets DPRK’s threat actors apart from other nation-state groupsA closer look at North Korea’s cyber and physical support for Russia in UkraineHow cyb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host Sara Sabotka are joined by Saher Naumaan and Greg Lesnewich, teammates on the espionage threat research team at Proofpoint to unravel the multifaceted—and often bizarre—world of North Korean cyber operations. </b></p><p><br/></p><p><b>The team explores:</b></p><ul><li><b>What sets DPRK’s threat actors apart from other nation-state groups</b></li><li><b>A closer look at North Korea’s cyber and physical support for Russia in Ukraine</b></li><li><b>How cyber activity plays a central role in North Korea’s national strategy—not just a supporting one<br/><br/></b><br/></li><li><b>The phishing-heavy tactics of groups like TA427 (“Old Reliable”) and the emergence of oddball clusters like “Contagious Interview” and “UNK RageQuit”<br/><br/></b><br/></li><li><b>How North Korean actors blur the lines between espionage and financially motivated cybercrime<br/><br/></b><br/></li><li><b>The murky world of North Korean IT workers infiltrating global tech companies under false identities—raising critical questions about workplace exposure, ethics, and potential defections<br/><br/></b><br/></li><li><b>The surprising ways some of these operatives sabotage themselves, including infections with common malware that expose their digital behavior<br/><br/></b><br/></li><li><b>And yes, a Microsoft spoofing campaign actually using Comic Sans</b></li></ul><p><br/></p><p><b>North Korean cyber activity is evolving fast and they explain why it deserves far more attention than it gets. </b></p><p><b> </b></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front'><b>https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front</b></a></p><p><br/></p><p><a href='https://spycloud.com/blog/spycloud-march-cybercrime-update/'><b>https://spycloud.com/blog/spycloud-march-cybercrime-update/</b></a></p><p><br/></p><p><a href='https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf'><b>https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Pals! In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host Sara Sabotka are joined by Saher Naumaan and Greg Lesnewich, teammates on the espionage threat research team at Proofpoint to unravel the multifaceted—and often bizarre—world of North Korean cyber operations. </b></p><p><br/></p><p><b>The team explores:</b></p><ul><li><b>What sets DPRK’s threat actors apart from other nation-state groups</b></li><li><b>A closer look at North Korea’s cyber and physical support for Russia in Ukraine</b></li><li><b>How cyber activity plays a central role in North Korea’s national strategy—not just a supporting one<br/><br/></b><br/></li><li><b>The phishing-heavy tactics of groups like TA427 (“Old Reliable”) and the emergence of oddball clusters like “Contagious Interview” and “UNK RageQuit”<br/><br/></b><br/></li><li><b>How North Korean actors blur the lines between espionage and financially motivated cybercrime<br/><br/></b><br/></li><li><b>The murky world of North Korean IT workers infiltrating global tech companies under false identities—raising critical questions about workplace exposure, ethics, and potential defections<br/><br/></b><br/></li><li><b>The surprising ways some of these operatives sabotage themselves, including infections with common malware that expose their digital behavior<br/><br/></b><br/></li><li><b>And yes, a Microsoft spoofing campaign actually using Comic Sans</b></li></ul><p><br/></p><p><b>North Korean cyber activity is evolving fast and they explain why it deserves far more attention than it gets. </b></p><p><b> </b></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front'><b>https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front</b></a></p><p><br/></p><p><a href='https://spycloud.com/blog/spycloud-march-cybercrime-update/'><b>https://spycloud.com/blog/spycloud-march-cybercrime-update/</b></a></p><p><br/></p><p><a href='https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf'><b>https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-threat-insight-paper-triple-threat-N-Korea-aligned-TA406-steals-scams-spies.pdf</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17427471-comic-sans-and-cybercrime-inside-north-korea-s-global-cyber-playbook.mp3" length="38060938" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17427471</guid>
    <pubDate>Tue, 01 Jul 2025 04:00:00 -0400</pubDate>
    <itunes:duration>3169</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>81</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Signatures and Surprises: Inside the Emerging Threats Team</itunes:title>
    <title>Signatures and Surprises: Inside the Emerging Threats Team</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Masked Vigilantes!  In this episode of Discarded, host Selena Larson and co-host Tim Kromhardt are joined by James Emery-Callcott, a Security Researcher on Proofpoint’s Emerging Threats team, for an insider’s look at the technical, tactical, and collaborative forces shaping modern network detection.   James takes us behind the curtain of rule writing, CVE coverage, and malware detection, breaking down how signatures are developed, validated, and d...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Masked Vigilantes!  In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host Tim Kromhardt are joined by James Emery-Callcott, a Security Researcher on Proofpoint’s Emerging Threats team, for an insider’s look at the technical, tactical, and collaborative forces shaping modern network detection.</b></p><p><br/></p><p><b>James takes us behind the curtain of rule writing, CVE coverage, and malware detection, breaking down how signatures are developed, validated, and deployed to protect against a constantly shifting threat landscape. From the fading heyday of exploit kits to the rise of infostealers and ClickFix, we explore how detections evolve—and why the most persistent threats often hinge on the fundamentals of networking.</b></p><p><b>You’ll also hear how the team maps detection rules to frameworks like MITRE ATT&amp;CK and CISA KEV, using metadata tags to reduce alert fatigue and prioritize real-world risks. James shares why this kind of tagging isn’t just technical polish—it’s operational gold.</b></p><p><b>But detection doesn’t happen in a vacuum. James explains how the community—through Discord chats, support tickets, and collaborative research—plays a vital role in surfacing false positives, sharing POCs, and suggesting metadata improvements. </b></p><p><b>Bonus highlights include:</b></p><ul><li><b>Why writing reliable detection rules is still too nuanced for AI<br/><br/></b><br/></li><li><b>The anatomy of a CVE rollout (and the surprising role of an Xbox controller)<br/><br/></b><br/></li><li><b>Signature performance testing and hardware challenges<br/><br/></b><br/></li><li><b>Why older vulnerabilities still matter<br/><br/></b><br/></li><li><b>A sneak peek at a free Suricata training series in the works<br/><br/></b><br/></li></ul><p><b>Whether it’s a shoutout to Tony for pushing tagging innovation or a nod to students eager to get started, the message is clear: everyone can contribute to better detection.</b></p><p><br/></p><p><br/></p><p><br/></p><p><br/></p><p><b> </b></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><b>CrazyHunter: https://www.trendmicro.com/en_us/research/25/d/crazyhunter-campaign.html</b></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/emerging-threats-updates-improve-metadata-including-mitre-attck-tags'><b>https://www.proofpoint.com/us/blog/threat-insight/emerging-threats-updates-improve-metadata-including-mitre-attck-tags</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hello to all our Cyber Masked Vigilantes!  In this episode of </b><b><em>Discarded</em></b><b>, host Selena Larson and co-host Tim Kromhardt are joined by James Emery-Callcott, a Security Researcher on Proofpoint’s Emerging Threats team, for an insider’s look at the technical, tactical, and collaborative forces shaping modern network detection.</b></p><p><br/></p><p><b>James takes us behind the curtain of rule writing, CVE coverage, and malware detection, breaking down how signatures are developed, validated, and deployed to protect against a constantly shifting threat landscape. From the fading heyday of exploit kits to the rise of infostealers and ClickFix, we explore how detections evolve—and why the most persistent threats often hinge on the fundamentals of networking.</b></p><p><b>You’ll also hear how the team maps detection rules to frameworks like MITRE ATT&amp;CK and CISA KEV, using metadata tags to reduce alert fatigue and prioritize real-world risks. James shares why this kind of tagging isn’t just technical polish—it’s operational gold.</b></p><p><b>But detection doesn’t happen in a vacuum. James explains how the community—through Discord chats, support tickets, and collaborative research—plays a vital role in surfacing false positives, sharing POCs, and suggesting metadata improvements. </b></p><p><b>Bonus highlights include:</b></p><ul><li><b>Why writing reliable detection rules is still too nuanced for AI<br/><br/></b><br/></li><li><b>The anatomy of a CVE rollout (and the surprising role of an Xbox controller)<br/><br/></b><br/></li><li><b>Signature performance testing and hardware challenges<br/><br/></b><br/></li><li><b>Why older vulnerabilities still matter<br/><br/></b><br/></li><li><b>A sneak peek at a free Suricata training series in the works<br/><br/></b><br/></li></ul><p><b>Whether it’s a shoutout to Tony for pushing tagging innovation or a nod to students eager to get started, the message is clear: everyone can contribute to better detection.</b></p><p><br/></p><p><br/></p><p><br/></p><p><br/></p><p><b> </b></p><p><b>Resources Mentioned:</b></p><p><br/></p><p><b>CrazyHunter: https://www.trendmicro.com/en_us/research/25/d/crazyhunter-campaign.html</b></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/emerging-threats-updates-improve-metadata-including-mitre-attck-tags'><b>https://www.proofpoint.com/us/blog/threat-insight/emerging-threats-updates-improve-metadata-including-mitre-attck-tags</b></a></p><p><br/></p><p><br/></p><p><b>For more information about Proofpoint, </b><a href='https://www.proofpoint.com/us/podcasts'><b>check out our website</b></a><b>.</b></p><p><b> </b></p><p><br/></p><p><b>Subscribe &amp; Follow:</b></p><p><b>Stay ahead of emerging threats, and subscribe! Happy hunting!</b></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17356344-signatures-and-surprises-inside-the-emerging-threats-team.mp3" length="31658672" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17356344</guid>
    <pubDate>Wed, 18 Jun 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2635</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>80</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DBIR Deep Dive: Identity, Access, and the Expanding Attack Surface</itunes:title>
    <title>DBIR Deep Dive: Identity, Access, and the Expanding Attack Surface</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Stars! Join host Selena Larson, and guest host, Sarah Sabotka, as they sit down with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business and the lead author behind the industry-defining Verizon Data Breach Investigations Report (DBIR). Together, they unpack the most pressing findings from the brand new VZDBIR, offering a behind-the-scenes look at how the reports are built—and what they reveal about today’s rapidly evolving threat ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Stars! Join host Selena Larson, and guest host, Sarah Sabotka, as they sit down with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business and the lead author behind the industry-defining Verizon Data Breach Investigations Report (DBIR). Together, they unpack the most pressing findings from the brand new VZDBIR, offering a behind-the-scenes look at how the reports are built—and what they reveal about today’s rapidly evolving threat landscape.</p><p>Alex shares how the editorial strategy behind the DBIR helps translate raw data from 100+ contributors into actionable insights and compelling narratives. </p><p>The conversation dives into: </p><ul><li>The surge in zero-day vulnerabilities and growing threats tied to network edge devices<br/><br/><br/></li><li>Why third-party risk is skyrocketing, and what that means for vendor relationships<br/><br/><br/></li><li>How ransomware groups are maturing and reinvesting like modern businesses<br/><br/><br/></li><li>The alarming rise of credential abuse via MFA-bypassing phishing kits and information stealers<br/><br/><br/></li><li>Why identity is now the primary target—and how defenders can introduce friction without killing usability<br/><br/><br/></li><li>The limitations of current threat categorization and whether full attack chain visualizations should be next</li></ul><p><br/></p><p>Whether you&apos;re here for the acronyms, the insights, or just want to win at cyber threat bingo, this episode is a must-listen for anyone navigating the modern security landscape.</p><p>🎧 Tune in to hear why “DBIR Day” matters—and how this year’s findings may be more personal than ever.</p><p><br/></p><p> </p><p>Resources Mentioned:</p><p><a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></p><p><br/></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Stars! Join host Selena Larson, and guest host, Sarah Sabotka, as they sit down with Alex Pinto, Associate Director of Threat Intelligence at Verizon Business and the lead author behind the industry-defining Verizon Data Breach Investigations Report (DBIR). Together, they unpack the most pressing findings from the brand new VZDBIR, offering a behind-the-scenes look at how the reports are built—and what they reveal about today’s rapidly evolving threat landscape.</p><p>Alex shares how the editorial strategy behind the DBIR helps translate raw data from 100+ contributors into actionable insights and compelling narratives. </p><p>The conversation dives into: </p><ul><li>The surge in zero-day vulnerabilities and growing threats tied to network edge devices<br/><br/><br/></li><li>Why third-party risk is skyrocketing, and what that means for vendor relationships<br/><br/><br/></li><li>How ransomware groups are maturing and reinvesting like modern businesses<br/><br/><br/></li><li>The alarming rise of credential abuse via MFA-bypassing phishing kits and information stealers<br/><br/><br/></li><li>Why identity is now the primary target—and how defenders can introduce friction without killing usability<br/><br/><br/></li><li>The limitations of current threat categorization and whether full attack chain visualizations should be next</li></ul><p><br/></p><p>Whether you&apos;re here for the acronyms, the insights, or just want to win at cyber threat bingo, this episode is a must-listen for anyone navigating the modern security landscape.</p><p>🎧 Tune in to hear why “DBIR Day” matters—and how this year’s findings may be more personal than ever.</p><p><br/></p><p> </p><p>Resources Mentioned:</p><p><a href='https://www.verizon.com/business/resources/reports/dbir/'>https://www.verizon.com/business/resources/reports/dbir/</a></p><p><br/></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17282402-dbir-deep-dive-identity-access-and-the-expanding-attack-surface.mp3" length="37250586" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17282402</guid>
    <pubDate>Wed, 04 Jun 2025 15:00:00 -0400</pubDate>
    <itunes:duration>3101</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>79</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The ClickFix Convergence: How Threat Actors Blur the Lines</itunes:title>
    <title>The ClickFix Convergence: How Threat Actors Blur the Lines</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naumaan, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines. At the center of the conversation is ClickFix—a fast-evolving social engineering technique originally used by cybercriminals but now adopted by espionage actors across at least three countries in just 90 days.  We e...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naumaan, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines.</p><p>At the center of the conversation is ClickFix—a fast-evolving social engineering technique originally used by cybercriminals but now adopted by espionage actors across at least three countries in just 90 days. </p><p>We explore: </p><ul><li>how threat actors are borrowing each other’s tactics, techniques, and procedures (TTPs), creating “muddled attribution” as espionage groups mimic high-volume e-crime methods</li><li>how these techniques are being tailored to target high-value, often non-technical individuals</li><li>what defenders can do in the face of increasingly sophisticated psychological attacks </li></ul><p>Resources Mentioned:</p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix'>https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix</a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape</a></p><p><br/></p><p><a href='https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/'>https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/</a></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Spring Chickens! Join host Selena Larson, and guest host, Sarah Sabotka, as they chat with Saher Naumaan, Senior Threat Researcher at Proofpoint, for a deep dive into how modern espionage and cybercrime are increasingly blurring lines.</p><p>At the center of the conversation is ClickFix—a fast-evolving social engineering technique originally used by cybercriminals but now adopted by espionage actors across at least three countries in just 90 days. </p><p>We explore: </p><ul><li>how threat actors are borrowing each other’s tactics, techniques, and procedures (TTPs), creating “muddled attribution” as espionage groups mimic high-volume e-crime methods</li><li>how these techniques are being tailored to target high-value, often non-technical individuals</li><li>what defenders can do in the face of increasingly sophisticated psychological attacks </li></ul><p>Resources Mentioned:</p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix'>https://www.proofpoint.com/us/blog/threat-insight/around-world-90-days-state-sponsored-actors-try-clickfix</a></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape</a></p><p><br/></p><p><a href='https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/'>https://www.volexity.com/blog/2025/02/13/multiple-russian-threat-actors-targeting-microsoft-device-code-authentication/</a></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17158190-the-clickfix-convergence-how-threat-actors-blur-the-lines.mp3" length="25830336" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17158190</guid>
    <pubDate>Wed, 14 May 2025 12:00:00 -0400</pubDate>
    <itunes:duration>2149</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>78</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Art of the Innocent Ask: How Threat Actors Use Benign Conversations</itunes:title>
    <title>The Art of the Innocent Ask: How Threat Actors Use Benign Conversations</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint.  These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exactly is a benign conversation—and why is it anything but harmless? Whether it’s a simple “Do you have a minute?” or a seeming...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. </p><p>These top sleuths crack open Proofpoint’s new <em>Human Factor</em> series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation.</p><p>What exactly is a benign conversation—and why is it anything but harmless? Whether it’s a simple “Do you have a minute?” or a seemingly legit job offer, these messages are often the opening moves in complex social engineering attacks used for fraud, malware delivery, and even nation-state espionage.</p><p>The team dives into:</p><ul><li>The top five fraud-related benign conversation themes, including the rise of advanced fee fraud<br/><br/><br/></li><li>Real-world examples of job scams, gift card requests, and a Taylor Swift-themed lure<br/><br/><br/></li><li>The difference between financially motivated lures and espionage-style social engineering<br/><br/><br/></li><li>How Iranian and North Korean threat actors are perfecting the art of trust-building through impersonation and tailored messages<br/><br/><br/></li><li>TOAD scams (Telephone-Oriented Attack Delivery) and the power of fear and urgency<br/><br/><br/></li><li>The critical role of spoofing in making these attacks believable<br/><br/><br/></li><li>The human toll and psychological manipulation behind scams like pig butchering—and why acknowledging the abuse behind them matters<br/><br/><br/></li></ul><p>From hijacked contact forms and fake antivirus invoices to AI-generated phone calls and scam compounds, this episode blends serious security insight with Friday vibes and candid discussion. </p><p>Whether you&apos;re a seasoned threat analyst or just here for the “lure-palooza,” you’ll walk away with a sharper eye for red flags—and a deeper understanding of the evolving cyber threat landscape.</p><p><br/></p><p><br/></p><p> </p><p>Resources Mentioned:</p><p>🔍 [Read the full report] <a href='https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering'>https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering</a></p><p><br/></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. </p><p>These top sleuths crack open Proofpoint’s new <em>Human Factor</em> series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation.</p><p>What exactly is a benign conversation—and why is it anything but harmless? Whether it’s a simple “Do you have a minute?” or a seemingly legit job offer, these messages are often the opening moves in complex social engineering attacks used for fraud, malware delivery, and even nation-state espionage.</p><p>The team dives into:</p><ul><li>The top five fraud-related benign conversation themes, including the rise of advanced fee fraud<br/><br/><br/></li><li>Real-world examples of job scams, gift card requests, and a Taylor Swift-themed lure<br/><br/><br/></li><li>The difference between financially motivated lures and espionage-style social engineering<br/><br/><br/></li><li>How Iranian and North Korean threat actors are perfecting the art of trust-building through impersonation and tailored messages<br/><br/><br/></li><li>TOAD scams (Telephone-Oriented Attack Delivery) and the power of fear and urgency<br/><br/><br/></li><li>The critical role of spoofing in making these attacks believable<br/><br/><br/></li><li>The human toll and psychological manipulation behind scams like pig butchering—and why acknowledging the abuse behind them matters<br/><br/><br/></li></ul><p>From hijacked contact forms and fake antivirus invoices to AI-generated phone calls and scam compounds, this episode blends serious security insight with Friday vibes and candid discussion. </p><p>Whether you&apos;re a seasoned threat analyst or just here for the “lure-palooza,” you’ll walk away with a sharper eye for red flags—and a deeper understanding of the evolving cyber threat landscape.</p><p><br/></p><p><br/></p><p> </p><p>Resources Mentioned:</p><p>🔍 [Read the full report] <a href='https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering'>https://www.proofpoint.com/us/resources/threat-reports/human-factor-social-engineering</a></p><p><br/></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/17059556-the-art-of-the-innocent-ask-how-threat-actors-use-benign-conversations.mp3" length="41910309" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17059556</guid>
    <pubDate>Tue, 29 Apr 2025 04:00:00 -0400</pubDate>
    <itunes:duration>3489</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>77</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats</itunes:title>
    <title>Diving Into Cyber Journalism: FOIA, Fraud, and the Fight Against Online Threats</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Cherry Blossoms! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Andrew Couts, Senior Editor, Security and Investigations at WIRED. Andrew shares insights into his work overseeing cybersecurity coverage and investigative reporting, collaborating with newsrooms, and uncovering the hidden threats lurking in the digital world. We dive into how cybersecurity and privacy reporting has evolved, the growin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Cherry Blossoms! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Andrew Couts, Senior Editor, Security and Investigations at WIRED.</p><p>Andrew shares insights into his work overseeing cybersecurity coverage and investigative reporting, collaborating with newsrooms, and uncovering the hidden threats lurking in the digital world.</p><p>We dive into how cybersecurity and privacy reporting has evolved, the growing risks posed by data collection and surveillance, and the challenges of informing the public around security experimentation. </p><p>We also discuss:</p><ul><li>Recent investigations on ad tech, police drone surveillance, and the unintended consequences of data tracking</li><li>The rise of &quot;pig butchering&quot; scams and the difficulties in shutting them down</li><li>How the Freedom of Information Act (FOIA) serves as a powerful tool for uncovering hidden government actions</li><li>The real-world dangers journalists face when reporting on cybercriminals—such as swatting and online retaliation</li><li>The double-edged sword of privacy—how encryption and digital anonymity can both protect individuals and make it harder to track cybercriminals</li></ul><p>Join us for a fascinating deep dive into the world of digital security, investigative journalism, and the real-life implications of living in an era where our data is constantly at risk. </p><p>Resources Mentioned:</p><p><a href='https://www.wired.com/sponsored/story/leveling-up-your-cybersecurity/'>Leveling Up Your Cybersecurity</a>–WIRED Guide</p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqqpLLWPw$'>https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/the-age-of-the-drone-police-is-here/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqAuXvp0g$'>https://www.wired.com/story/the-age-of-the-drone-police-is-here/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/starlink-scam-compounds/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqpfZUhD4$'>https://www.wired.com/story/starlink-scam-compounds/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/alan-filion-torswats-swatting-arrest/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqCRC-_Vk$'>https://www.wired.com/story/alan-filion-torswats-swatting-arrest/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/no-lives-matter-764-violence/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq5Oe73wY$'>https://www.wired.com/story/no-lives-matter-764-violence/</a> (Content warning: self-harm, violence) </p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/the-wired-guide-to-protecting-yourself-from-government-surveillance/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq1WT64FY$'>https://www.wired.com/story/the-wired-guide-to-protecting-yourself-from-government-surveillance/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/how-to-take-photos-at-protests/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq8SKWtHg$'>https://www.wired.com/story/how-to-take-photos-at-protests/</a></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Cherry Blossoms! Join host Selena Larson and guest host, Tim Kromphardt, a Senior Threat Researcher, as they chat with Andrew Couts, Senior Editor, Security and Investigations at WIRED.</p><p>Andrew shares insights into his work overseeing cybersecurity coverage and investigative reporting, collaborating with newsrooms, and uncovering the hidden threats lurking in the digital world.</p><p>We dive into how cybersecurity and privacy reporting has evolved, the growing risks posed by data collection and surveillance, and the challenges of informing the public around security experimentation. </p><p>We also discuss:</p><ul><li>Recent investigations on ad tech, police drone surveillance, and the unintended consequences of data tracking</li><li>The rise of &quot;pig butchering&quot; scams and the difficulties in shutting them down</li><li>How the Freedom of Information Act (FOIA) serves as a powerful tool for uncovering hidden government actions</li><li>The real-world dangers journalists face when reporting on cybercriminals—such as swatting and online retaliation</li><li>The double-edged sword of privacy—how encryption and digital anonymity can both protect individuals and make it harder to track cybercriminals</li></ul><p>Join us for a fascinating deep dive into the world of digital security, investigative journalism, and the real-life implications of living in an era where our data is constantly at risk. </p><p>Resources Mentioned:</p><p><a href='https://www.wired.com/sponsored/story/leveling-up-your-cybersecurity/'>Leveling Up Your Cybersecurity</a>–WIRED Guide</p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqqpLLWPw$'>https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/the-age-of-the-drone-police-is-here/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqAuXvp0g$'>https://www.wired.com/story/the-age-of-the-drone-police-is-here/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/starlink-scam-compounds/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqpfZUhD4$'>https://www.wired.com/story/starlink-scam-compounds/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/alan-filion-torswats-swatting-arrest/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxqCRC-_Vk$'>https://www.wired.com/story/alan-filion-torswats-swatting-arrest/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/no-lives-matter-764-violence/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq5Oe73wY$'>https://www.wired.com/story/no-lives-matter-764-violence/</a> (Content warning: self-harm, violence) </p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/the-wired-guide-to-protecting-yourself-from-government-surveillance/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq1WT64FY$'>https://www.wired.com/story/the-wired-guide-to-protecting-yourself-from-government-surveillance/</a></p><p><a href='https://urldefense.com/v3/__https:/www.wired.com/story/how-to-take-photos-at-protests/__;!!ORgEfCBsr282Fw!u63aVf6u1mwI3qXUzYmTDj23XvZUerPm-7reGt6dV6Q-as0Wh4mik3UG4DywmqWnw1jYnU1PdRfknOxq8SKWtHg$'>https://www.wired.com/story/how-to-take-photos-at-protests/</a></p><p><br/></p><p> For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16945243-diving-into-cyber-journalism-foia-fraud-and-the-fight-against-online-threats.mp3" length="33572360" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16945243</guid>
    <pubDate>Wed, 09 Apr 2025 09:00:00 -0400</pubDate>
    <itunes:duration>2795</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>76</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>RMM Tools: The New Cybercrime Trick?</itunes:title>
    <title>RMM Tools: The New Cybercrime Trick?</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a  Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access Software) to gain initial access in emai...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a  Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access Software) to gain initial access in email-based attacks. </p><p> </p><p> Topics Covered:</p><ul><li>The growing use of such tools like ScreenConnect, Atera, and NetSupport in cyberattacks</li><li>How threat actors are shifting from traditional malware loaders to commercially available tools</li><li>TA583’s adoption of RMM tools as a primary attack method</li><li>The role of social engineering in phishing lures, including Social Security scams</li><li>The impact of cybersecurity influencers and scam-baiting YouTubers on threat awareness</li><li>The ongoing arms race between cybercriminals and defenders</li></ul><p><br/></p><p>From stealthy intrusions to shifting cybercrime trends, this conversation uncovers the critical threats organizations face in 2025.</p><p> </p><p>Resources Mentioned:</p><p> </p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice'>https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice</a></p><p> </p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Remote Cyber Pals! Join host Selena Larson and guest host, Tim Kromphardt, a  Senior Threat Researcher, as they chat with Staff Threat Researcher, Ole Villadsen, from Proofpoint. They explore the broader shift from traditional malware to commercially available tools that fly under the radar and how cybercriminals are increasingly abusing Remote Monitoring and Management (RMM) tools (sometimes called Remote Access Software) to gain initial access in email-based attacks. </p><p> </p><p> Topics Covered:</p><ul><li>The growing use of such tools like ScreenConnect, Atera, and NetSupport in cyberattacks</li><li>How threat actors are shifting from traditional malware loaders to commercially available tools</li><li>TA583’s adoption of RMM tools as a primary attack method</li><li>The role of social engineering in phishing lures, including Social Security scams</li><li>The impact of cybersecurity influencers and scam-baiting YouTubers on threat awareness</li><li>The ongoing arms race between cybercriminals and defenders</li></ul><p><br/></p><p>From stealthy intrusions to shifting cybercrime trends, this conversation uncovers the critical threats organizations face in 2025.</p><p> </p><p>Resources Mentioned:</p><p> </p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice'>https://www.proofpoint.com/us/blog/threat-insight/remote-monitoring-and-management-rmm-tooling-increasingly-attackers-first-choice</a></p><p> </p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p> </p><p><br/></p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16852420-rmm-tools-the-new-cybercrime-trick.mp3" length="27133595" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16852420</guid>
    <pubDate>Tue, 25 Mar 2025 04:00:00 -0400</pubDate>
    <itunes:duration>2258</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>75</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Your Best Defense against Social Engineering: The Gray-Matter Firewall</itunes:title>
    <title>Your Best Defense against Social Engineering: The Gray-Matter Firewall</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest hosts, Sarah Sabotka and Tim Kromphardt, both Senior Threat Researchers from Proofpoint, as they dive into the realities of current social engineering schemes —especially during high-risk times like tax season. Cybercriminals exploit fear, urgency, and excitement to manipulate victims, from IRS impersonation scams and fraudulent tax payment requests to deepfake cons and TikTok frauds. Our hosts dive into real-wor...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Join host Selena Larson and guest hosts, Sarah Sabotka and Tim Kromphardt, both Senior Threat Researchers from Proofpoint, as they dive into the realities of current social engineering schemes —especially during high-risk times like tax season. Cybercriminals exploit fear, urgency, and excitement to manipulate victims, from IRS impersonation scams and fraudulent tax payment requests to deepfake cons and TikTok frauds.</p><p>Our hosts dive into real-world examples, including:</p><ul><li>tax-themed phishing attacks</li><li>tech support scams targeting the elderly</li><li>job scams leveraging Taylor Swift’s tour</li></ul><p>They explore how AI is reshaping fraud tactics, why scammers still rely on outdated schemes like overseas financial windfalls, and how platforms like WhatsApp and Telegram play a role in modern cybercrime.</p><p><br/><br/></p><p>Tune in to learn how these scams work, why they succeed, and—most importantly—how you can protect yourself. Check out our show notes for additional resources, and don’t forget to share this episode with friends and colleagues!</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Join host Selena Larson and guest hosts, Sarah Sabotka and Tim Kromphardt, both Senior Threat Researchers from Proofpoint, as they dive into the realities of current social engineering schemes —especially during high-risk times like tax season. Cybercriminals exploit fear, urgency, and excitement to manipulate victims, from IRS impersonation scams and fraudulent tax payment requests to deepfake cons and TikTok frauds.</p><p>Our hosts dive into real-world examples, including:</p><ul><li>tax-themed phishing attacks</li><li>tech support scams targeting the elderly</li><li>job scams leveraging Taylor Swift’s tour</li></ul><p>They explore how AI is reshaping fraud tactics, why scammers still rely on outdated schemes like overseas financial windfalls, and how platforms like WhatsApp and Telegram play a role in modern cybercrime.</p><p><br/><br/></p><p>Tune in to learn how these scams work, why they succeed, and—most importantly—how you can protect yourself. Check out our show notes for additional resources, and don’t forget to share this episode with friends and colleagues!</p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Stay ahead of emerging threats, and subscribe! Happy hunting!</p><p><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16767435-your-best-defense-against-social-engineering-the-gray-matter-firewall.mp3" length="36832701" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16767435</guid>
    <pubDate>Tue, 11 Mar 2025 04:00:00 -0400</pubDate>
    <itunes:duration>3066</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>74</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hiding in Plain Sight: How Defenders Get Creative with Image Detection</itunes:title>
    <title>Hiding in Plain Sight: How Defenders Get Creative with Image Detection</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest host, Sarah Sabotka, as they speak with Kyle Eaton, Senior Security Research Engineer at Proofpoint. They explore the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses. From image lures embedded in emails, PDFs, and Office documents to the surprising ways attackers reuse visuals across campaigns, this conversation break down how detection engineering is ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Join host Selena Larson and guest host, Sarah Sabotka, as they speak with Kyle Eaton, Senior Security Research Engineer at Proofpoint.</p><p>They explore the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses. From image lures embedded in emails, PDFs, and Office documents to the surprising ways attackers reuse visuals across campaigns, this conversation break down how detection engineering is adapting to counter new threats.</p><p>There is also examination of how AI is shaping both cyber deception and detection, raising the question of how generative AI is influencing image-based security.</p><p>Listeners will gain insights into real-world detection successes, persistent threats like TA505 and Emotet, and the role of instincts in cybersecurity—because, as Selena notes, sometimes good detection is all about the vibes. </p><p>Key Topics Covered:</p><ul><li>Characteristics of Image-Based Threats</li><li>Groups like TA505 and Emotet historically using recognizable image lures</li><li>OneNote-Based Malware Detection (2023) &amp; the Challenges with OneNote</li><li>Shift to PDF-Based Threats</li><li>PDF Object Hashing for Attribution &amp; Detection</li><li>Image-Based Threat Detection Insights</li><li>Generative AI’s Impact on Image-Based Threats</li></ul><p>Join us as we uncover real-world detection wins, explore persistent threats like TA505 and Emotet, and dive into the importance of instincts in cybersecurity—because, as our guest puts it, sometimes good detection is all about the vibes.</p><p><br/></p><p><br/></p><p>Resources mentioned:</p><p><a href='https://github.com/target/halogen'><b>https://github.com/target/halogen</b></a></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware'><b>https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware</b></a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p>Hello to all our Cyber Pals! Join host Selena Larson and guest host, Sarah Sabotka, as they speak with Kyle Eaton, Senior Security Research Engineer at Proofpoint.</p><p>They explore the evolving world of image-based threat detection and the deceptive tactics cybercriminals use to evade defenses. From image lures embedded in emails, PDFs, and Office documents to the surprising ways attackers reuse visuals across campaigns, this conversation break down how detection engineering is adapting to counter new threats.</p><p>There is also examination of how AI is shaping both cyber deception and detection, raising the question of how generative AI is influencing image-based security.</p><p>Listeners will gain insights into real-world detection successes, persistent threats like TA505 and Emotet, and the role of instincts in cybersecurity—because, as Selena notes, sometimes good detection is all about the vibes. </p><p>Key Topics Covered:</p><ul><li>Characteristics of Image-Based Threats</li><li>Groups like TA505 and Emotet historically using recognizable image lures</li><li>OneNote-Based Malware Detection (2023) &amp; the Challenges with OneNote</li><li>Shift to PDF-Based Threats</li><li>PDF Object Hashing for Attribution &amp; Detection</li><li>Image-Based Threat Detection Insights</li><li>Generative AI’s Impact on Image-Based Threats</li></ul><p>Join us as we uncover real-world detection wins, explore persistent threats like TA505 and Emotet, and dive into the importance of instincts in cybersecurity—because, as our guest puts it, sometimes good detection is all about the vibes.</p><p><br/></p><p><br/></p><p>Resources mentioned:</p><p><a href='https://github.com/target/halogen'><b>https://github.com/target/halogen</b></a></p><p><br/></p><p><a href='https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware'><b>https://www.proofpoint.com/us/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware</b></a></p><p><br/></p><p>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts'>check out our website</a>.</p><p><br/></p><p>Subscribe &amp; Follow:</p><p>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16671272-hiding-in-plain-sight-how-defenders-get-creative-with-image-detection.mp3" length="33058517" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16671272</guid>
    <pubDate>Tue, 25 Feb 2025 04:00:00 -0500</pubDate>
    <itunes:duration>2752</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>73</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Groundhog Day and romance scams, featuring Only Malware in the Building</itunes:title>
    <title>Cyber Groundhog Day and romance scams, featuring Only Malware in the Building</title>
    <itunes:summary><![CDATA[Send us fan mail! Hey Cyber Pals! This week we are doing a very special spotlight on a recent episode from Only Malware in the Building. Our very own, Selena Larson, also co-hosts on this fabulous podcast.    Be sure to check it out and enjoy!   Find more OMIB: https://thecyberwire.com/podcasts/only-malware-in-the-building/9/notes —------------------------------------------------   Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hey Cyber Pals! This week we are doing a very special spotlight on a recent episode from Only Malware in the Building. Our very own, Selena Larson, also co-hosts on this fabulous podcast. </b></p><p><br/></p><p><b>Be sure to check it out and enjoy!</b></p><p><br/></p><p><b>Find more OMIB: https://thecyberwire.com/podcasts/only-malware-in-the-building/9/notes</b></p><p><b>—------------------------------------------------</b></p><p><br/></p><p><b>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.</b></p><p><b>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode and since it is February (the month of love as Selena calls it), we talk about romance scams known throughout the security world as pig butchering. And, Rick&apos;s experiencing a bit of a Cyber Groundhog Day in his newly-realized retirement.</b></p><p><b><br/></b><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><p><b>Hey Cyber Pals! This week we are doing a very special spotlight on a recent episode from Only Malware in the Building. Our very own, Selena Larson, also co-hosts on this fabulous podcast. </b></p><p><br/></p><p><b>Be sure to check it out and enjoy!</b></p><p><br/></p><p><b>Find more OMIB: https://thecyberwire.com/podcasts/only-malware-in-the-building/9/notes</b></p><p><b>—------------------------------------------------</b></p><p><br/></p><p><b>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.</b></p><p><b>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode and since it is February (the month of love as Selena calls it), we talk about romance scams known throughout the security world as pig butchering. And, Rick&apos;s experiencing a bit of a Cyber Groundhog Day in his newly-realized retirement.</b></p><p><b><br/></b><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16569044-cyber-groundhog-day-and-romance-scams-featuring-only-malware-in-the-building.mp3" length="29414240" type="audio/mpeg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16569044</guid>
    <pubDate>Wed, 05 Feb 2025 10:00:00 -0500</pubDate>
    <itunes:duration>2448</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>72</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Power of Partnerships: An Interview with the NSA’s Kristina Walter</itunes:title>
    <title>The Power of Partnerships: An Interview with the NSA’s Kristina Walter</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Magicians! Join host Selena Larson and guest host, Joshua Miller, as they speak with Kristina Walter, the Chief of NSA’s Cybersecurity Collaboration Center.  They explore the cutting-edge collaborations between the NSA and industry partners to combat cyber threats, with a deep dive into the NSA’s Cybersecurity Collaboration Center (Triple C).  Kristina sheds light on the growing awareness around cyber hygiene, the importance of collective defense,...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Magicians! Join host Selena Larson and guest host, Joshua Miller, as they speak with Kristina Walter, the Chief of NSA’s Cybersecurity Collaboration Center.  They explore the cutting-edge collaborations between the NSA and industry partners to combat cyber threats, with a deep dive into the NSA’s Cybersecurity Collaboration Center (Triple C).<br/><br/>Kristina sheds light on the growing awareness around cyber hygiene, the importance of collective defense, and the role of partnerships between government and private sectors in tackling malicious activity. She also offers practical advice for those looking to break into government cybersecurity roles, dispelling myths about the need for a STEM background and highlighting the relevance of &quot;core skills&quot; like public speaking, decision-making, and risk management.<br/><br/>Key Topics Covered:<br/><ul><li>Public-private partnership success stories</li><li>NSA’s approach to global collaboration</li><li>The shift from information consumption to actionable intelligence sharing</li><li>The average American&apos;s cybersecurity concerns</li><li>Insights into the collaborative efforts needed to counter cyber threats</li><li>Naming malware campaigns</li></ul>The episode wraps up with tips on staying current in the fast-paced world of cybersecurity, from leveraging NSA advisories to building communities for information sharing. Whether you&apos;re an aspiring cybersecurity professional or an industry veteran, this episode is packed with actionable advice and thought-provoking perspectives.<br/><br/>Resources mentioned:<br/><a href='https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3805947/nsa-announces-kristina-walter-as-the-new-chief-of-cybersecurity-collaboration-c/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3805947/nsa-announces-kristina-walter-as-the-new-chief-of-cybersecurity-collaboration-c/</a><br/><br/><a href='https://www.nsa.gov/Press-Room/News-Highlights/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/News-Highlights/</a><br/><br/><a href='https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3669141/nsa-and-partners-spotlight-peoples-republic-of-china-targeting-of-us-critical-i/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3669141/nsa-and-partners-spotlight-peoples-republic-of-china-targeting-of-us-critical-i/</a><br/><br/><a href='https://www.nsa.gov/about/cybersecurity-collaboration-center/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/about/cybersecurity-collaboration-center/</a><b><br/><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Magicians! Join host Selena Larson and guest host, Joshua Miller, as they speak with Kristina Walter, the Chief of NSA’s Cybersecurity Collaboration Center.  They explore the cutting-edge collaborations between the NSA and industry partners to combat cyber threats, with a deep dive into the NSA’s Cybersecurity Collaboration Center (Triple C).<br/><br/>Kristina sheds light on the growing awareness around cyber hygiene, the importance of collective defense, and the role of partnerships between government and private sectors in tackling malicious activity. She also offers practical advice for those looking to break into government cybersecurity roles, dispelling myths about the need for a STEM background and highlighting the relevance of &quot;core skills&quot; like public speaking, decision-making, and risk management.<br/><br/>Key Topics Covered:<br/><ul><li>Public-private partnership success stories</li><li>NSA’s approach to global collaboration</li><li>The shift from information consumption to actionable intelligence sharing</li><li>The average American&apos;s cybersecurity concerns</li><li>Insights into the collaborative efforts needed to counter cyber threats</li><li>Naming malware campaigns</li></ul>The episode wraps up with tips on staying current in the fast-paced world of cybersecurity, from leveraging NSA advisories to building communities for information sharing. Whether you&apos;re an aspiring cybersecurity professional or an industry veteran, this episode is packed with actionable advice and thought-provoking perspectives.<br/><br/>Resources mentioned:<br/><a href='https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3805947/nsa-announces-kristina-walter-as-the-new-chief-of-cybersecurity-collaboration-c/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3805947/nsa-announces-kristina-walter-as-the-new-chief-of-cybersecurity-collaboration-c/</a><br/><br/><a href='https://www.nsa.gov/Press-Room/News-Highlights/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/News-Highlights/</a><br/><br/><a href='https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3669141/nsa-and-partners-spotlight-peoples-republic-of-china-targeting-of-us-critical-i/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3669141/nsa-and-partners-spotlight-peoples-republic-of-china-targeting-of-us-critical-i/</a><br/><br/><a href='https://www.nsa.gov/about/cybersecurity-collaboration-center/' target='_blank' rel='noreferrer noopener'>https://www.nsa.gov/about/cybersecurity-collaboration-center/</a><b><br/><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491516-the-power-of-partnerships-an-interview-with-the-nsa-s-kristina-walter.mp3" length="28475959" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yi7662l358jc95d144ua7ecnkzun?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/63817674</guid>
    <pubDate>Wed, 22 Jan 2025 12:15:29 -0500</pubDate>
    <itunes:duration>2370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Battle for a Safer Internet: Inside Domain Takedowns and Threat Actor Tactics</itunes:title>
    <title>The Battle for a Safer Internet: Inside Domain Takedowns and Threat Actor Tactics</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Magicians! Join host Selena Larson and guest host,Tim Kromphardt, as they speak with Hannah Rapetti, the Takedown Services Manager at Proofpoint. Hannah shares her fascinating journey from librarian to cybersecurity expert, detailing her path into the industry through certifications, CTFs (Capture the Flag), and the Women in Cybersecurity (WiCyS) community.The conversation dives into real-world examples, techniques, and strategies used to identify, tra...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Magicians! Join host Selena Larson and guest host,Tim Kromphardt, as they speak with Hannah Rapetti, the Takedown Services Manager at Proofpoint. Hannah shares her fascinating journey from librarian to cybersecurity expert, detailing her path into the industry through certifications, CTFs (Capture the Flag), and the Women in Cybersecurity (WiCyS) community.The conversation dives into real-world examples, techniques, and strategies used to identify, track, and eliminate malicious domains.<br/><br/>Key Topics Covered:<ul><li>Collaborative Efforts: How teams work together to identify scam websites, gather evidence, and escalate for takedown.</li><li>Tools and Techniques: Using tools like domain search, backend kits identification, and IP-based connections to uncover related sites.</li><li>Challenges in Takedowns: Managing lists of hundreds of domains across multiple providers, verifying live activity, and the need for ongoing monitoring.</li><li>Threat Actor Behavior: How threat actors use multiple registrars or re-register domains to evade detection.</li><li>Best Practices for Organizations:<ul><li>Preemptively purchasing lookalike domains.</li><li>Monitoring new domain registrations for suspicious activity.</li><li>Educating users to identify and avoid malicious domains.</li></ul></li><li>Ethical Considerations: Balancing infrastructure disruption with the need for ongoing research, particularly for cyber espionage threats.</li><li>Favorite Wins: Memorable investigations, such as takedowns during the Super Bowl, fake Olympics ticket scams, and real-time disruption of pig-butchering schemes.</li></ul>The episode highlights the importance of domain takedowns not just for individual companies but for contributing to a safer internet ecosystem. It’s a mix of practical advice, real-life stories, and insights into the ongoing battle against cybercrime.<br/><br/>Resources mentioned:<br/><a href='https://podcasts.apple.com/us/podcast/scams-smishing-and-safety-nets-how-emerging-threats/id1612506550?i=1000677061400' target='_blank' rel='noreferrer noopener'>Genina Po Discarded Episode</a><br/><br/>https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers<br/><br/> <a href='https://www.wicys.org/' target='_blank' rel='noreferrer noopener'>https://www.wicys.org/</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers</a> <br/><a href='https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550?i=1000677061400' target='_blank' rel='noreferrer noopener'>https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550?i=1000677061400</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites</a><br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Magicians! Join host Selena Larson and guest host,Tim Kromphardt, as they speak with Hannah Rapetti, the Takedown Services Manager at Proofpoint. Hannah shares her fascinating journey from librarian to cybersecurity expert, detailing her path into the industry through certifications, CTFs (Capture the Flag), and the Women in Cybersecurity (WiCyS) community.The conversation dives into real-world examples, techniques, and strategies used to identify, track, and eliminate malicious domains.<br/><br/>Key Topics Covered:<ul><li>Collaborative Efforts: How teams work together to identify scam websites, gather evidence, and escalate for takedown.</li><li>Tools and Techniques: Using tools like domain search, backend kits identification, and IP-based connections to uncover related sites.</li><li>Challenges in Takedowns: Managing lists of hundreds of domains across multiple providers, verifying live activity, and the need for ongoing monitoring.</li><li>Threat Actor Behavior: How threat actors use multiple registrars or re-register domains to evade detection.</li><li>Best Practices for Organizations:<ul><li>Preemptively purchasing lookalike domains.</li><li>Monitoring new domain registrations for suspicious activity.</li><li>Educating users to identify and avoid malicious domains.</li></ul></li><li>Ethical Considerations: Balancing infrastructure disruption with the need for ongoing research, particularly for cyber espionage threats.</li><li>Favorite Wins: Memorable investigations, such as takedowns during the Super Bowl, fake Olympics ticket scams, and real-time disruption of pig-butchering schemes.</li></ul>The episode highlights the importance of domain takedowns not just for individual companies but for contributing to a safer internet ecosystem. It’s a mix of practical advice, real-life stories, and insights into the ongoing battle against cybercrime.<br/><br/>Resources mentioned:<br/><a href='https://podcasts.apple.com/us/podcast/scams-smishing-and-safety-nets-how-emerging-threats/id1612506550?i=1000677061400' target='_blank' rel='noreferrer noopener'>Genina Po Discarded Episode</a><br/><br/>https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers<br/><br/> <a href='https://www.wicys.org/' target='_blank' rel='noreferrer noopener'>https://www.wicys.org/</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/pig-butchers-join-gig-economy-cryptocurrency-scammers-target-job-seekers</a> <br/><a href='https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550?i=1000677061400' target='_blank' rel='noreferrer noopener'>https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550?i=1000677061400</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites</a><br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491517-the-battle-for-a-safer-internet-inside-domain-takedowns-and-threat-actor-tactics.mp3" length="27459087" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rchwqmzz06f9jkfban9w733vwnz2?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/63398424</guid>
    <pubDate>Tue, 07 Jan 2025 04:00:08 -0500</pubDate>
    <itunes:duration>2285</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hackers, Heists, and Heroes: The Evolving Ransomware Game</itunes:title>
    <title>Hackers, Heists, and Heroes: The Evolving Ransomware Game</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest, ransomware expert, Allan Liska, CSIRT at Recorded Future, drops by to share his creative take on cyber-themed graphic novels, proving there’s nothing ransomware can’t inspire—even superheroes.   In this episode, we uncover the shadowy ecosystem driving ransomware attacks, from the industrialization of cybercrime to the rise of "small-batch" threat actors redefining chaos. Explore how Operation Endgame dealt...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Pals! Join host Selena Larson and guest, ransomware expert, Allan Liska, CSIRT at Recorded Future, drops by to share his creative take on cyber-themed graphic novels, proving there’s nothing ransomware can’t inspire—even superheroes. <br/><br/>In this episode, we uncover the shadowy ecosystem driving ransomware attacks, from the industrialization of cybercrime to the rise of &quot;small-batch&quot; threat actors redefining chaos. Explore how Operation Endgame dealt a devastating blow to malware powerhouses like Pikabot and SmokeLoader, shaking trust within underground networks and leaving cybercriminals scrambling to regroup.<br/><br/>We’ll also decode the evolving tactics of ransomware gangs, from slick AI-powered voice disguises to the surprising shift toward consumer scams. Plus, we’ll discuss whether law enforcement’s crackdown will make ransomware too expensive for crooks, forcing them to rethink their game plans—or at least settle for less glamorous schemes like crypto theft.<br/><br/>Don’t miss the Champagne pick that pairs perfectly with ransomware disruptions! 🥂<br/><br/><br/>Resources mentioned:<br/><a href='https://www.chainalysis.com/blog/2024-crypto-crime-mid-year-update-part-1/' target='_blank' rel='noreferrer noopener'>https://www.chainalysis.com/blog/2024-crypto-crime-mid-year-update-part-1/</a><br/><br/><a href='https://www.marketplace.org/shows/marketplace-tech/how-scammers-hijack-their-victims-brains/' target='_blank' rel='noreferrer noopener'>https://www.marketplace.org/shows/marketplace-tech/how-scammers-hijack-their-victims-brains/</a><br/><br/><a href='https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report' target='_blank' rel='noreferrer noopener'>https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown</a><br/><br/><a href='https://www.justice.gov/opa/pr/us-charges-russian-national-developing-and-operating-lockbit-ransomware' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/us-charges-russian-national-developing-and-operating-lockbit-ransomware</a><br/><br/><a href='https://therecord.media/russian-national-in-custody-extradited' target='_blank' rel='noreferrer noopener'>https://therecord.media/russian-national-in-custody-extradited</a><br/><br/><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a' target='_blank' rel='noreferrer noopener'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a</a><br/><br/><a href='https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/' target='_blank' rel='noreferrer noopener'>https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/</a><br/><br/><a href='https://therecord.media/chamelgang-china-apt-ransomware-distraction' target='_blank' rel='noreferrer noopener'>https://therecord.media/chamelgang-china-apt-ransomware-distraction</a><br/><br/>https://urldefense.com/v3/__https://www.recordedfuture.com/research/outmaneuvering-rhysida-advanced-threat-intelligence-shields-critical-infrastructure-ransomware__;!!ORgEfCBsr282Fw!pYnNQZUQJLJTFlj5w7PcWRjyr6rh-logFnqo03_Mz19RUrK4rftQU1qbTj_iql3KNjn4Ub7a5LsDLpCJgdJQSA$<br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Pals! Join host Selena Larson and guest, ransomware expert, Allan Liska, CSIRT at Recorded Future, drops by to share his creative take on cyber-themed graphic novels, proving there’s nothing ransomware can’t inspire—even superheroes. <br/><br/>In this episode, we uncover the shadowy ecosystem driving ransomware attacks, from the industrialization of cybercrime to the rise of &quot;small-batch&quot; threat actors redefining chaos. Explore how Operation Endgame dealt a devastating blow to malware powerhouses like Pikabot and SmokeLoader, shaking trust within underground networks and leaving cybercriminals scrambling to regroup.<br/><br/>We’ll also decode the evolving tactics of ransomware gangs, from slick AI-powered voice disguises to the surprising shift toward consumer scams. Plus, we’ll discuss whether law enforcement’s crackdown will make ransomware too expensive for crooks, forcing them to rethink their game plans—or at least settle for less glamorous schemes like crypto theft.<br/><br/>Don’t miss the Champagne pick that pairs perfectly with ransomware disruptions! 🥂<br/><br/><br/>Resources mentioned:<br/><a href='https://www.chainalysis.com/blog/2024-crypto-crime-mid-year-update-part-1/' target='_blank' rel='noreferrer noopener'>https://www.chainalysis.com/blog/2024-crypto-crime-mid-year-update-part-1/</a><br/><br/><a href='https://www.marketplace.org/shows/marketplace-tech/how-scammers-hijack-their-victims-brains/' target='_blank' rel='noreferrer noopener'>https://www.marketplace.org/shows/marketplace-tech/how-scammers-hijack-their-victims-brains/</a><br/><br/><a href='https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report' target='_blank' rel='noreferrer noopener'>https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown</a><br/><br/><a href='https://www.justice.gov/opa/pr/us-charges-russian-national-developing-and-operating-lockbit-ransomware' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/us-charges-russian-national-developing-and-operating-lockbit-ransomware</a><br/><br/><a href='https://therecord.media/russian-national-in-custody-extradited' target='_blank' rel='noreferrer noopener'>https://therecord.media/russian-national-in-custody-extradited</a><br/><br/><a href='https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a' target='_blank' rel='noreferrer noopener'>https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a</a><br/><br/><a href='https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/' target='_blank' rel='noreferrer noopener'>https://unit42.paloaltonetworks.com/north-korean-threat-group-play-ransomware/</a><br/><br/><a href='https://therecord.media/chamelgang-china-apt-ransomware-distraction' target='_blank' rel='noreferrer noopener'>https://therecord.media/chamelgang-china-apt-ransomware-distraction</a><br/><br/>https://urldefense.com/v3/__https://www.recordedfuture.com/research/outmaneuvering-rhysida-advanced-threat-intelligence-shields-critical-infrastructure-ransomware__;!!ORgEfCBsr282Fw!pYnNQZUQJLJTFlj5w7PcWRjyr6rh-logFnqo03_Mz19RUrK4rftQU1qbTj_iql3KNjn4Ub7a5LsDLpCJgdJQSA$<br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491606-hackers-heists-and-heroes-the-evolving-ransomware-game.mp3" length="41154603" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/funhqcjgnh5bq2i9u0rr60bci9nl?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/63304523</guid>
    <pubDate>Tue, 17 Dec 2024 04:00:07 -0500</pubDate>
    <itunes:duration>3426</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Stealth, Scale, and Strategy: Exploring China’s Covert Network Tactics</itunes:title>
    <title>Stealth, Scale, and Strategy: Exploring China’s Covert Network Tactics</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Frogs! Join host Selena Larson and guest host, Sarah Sabotka, explore the evolving tactics of China-based nation-state threat actors with guest Mark Kelly, Staff Threat Researcher at Proofpoint. They focus on TA415 (APT41 or Brass Typhoon), examining its combination of cybercrime and state-sponsored espionage. From the Voldemort malware campaign to targeting critical infrastructure, Mark sheds light on how these actors leverage tools like Google Sheets...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Frogs! Join host Selena Larson and guest host, Sarah Sabotka, explore the evolving tactics of China-based nation-state threat actors with guest Mark Kelly, Staff Threat Researcher at Proofpoint. They focus on TA415 (APT41 or Brass Typhoon), examining its combination of cybercrime and state-sponsored espionage. From the Voldemort malware campaign to targeting critical infrastructure, Mark sheds light on how these actors leverage tools like Google Sheets for command and control, exploit vulnerabilities, and adapt to evade detection.<br/><br/>The discussion also highlights:<ul><li>the strategic importance of edge devices, pre-positioning for geopolitical escalations, and the intersection of espionage, gaming, and cybercrime </li><li>Operational Relay Boxes (ORBs), covert networks used by Chinese Advanced Persistent Threat (APT) groups to mask cyber activities </li><li>exploitation of non-traditional systems and vulnerabilities</li><li>the impact of compromised consumer devices on global cybersecurity</li></ul><b><br/></b>Resources mentioned:<br/><a href='https://www.nytimes.com/2024/10/26/us/politics/salt-typhoon-hack-what-we-know.html' target='_blank' rel='noreferrer noopener'>https://www.nytimes.com/2024/10/26/us/politics/salt-typhoon-hack-what-we-know.html</a><br/><a href='https://cyberscoop.com/salt-typhoon-us-telecom-hack-earth-estries-trend-micro-report/' target='_blank' rel='noreferrer noopener'>https://cyberscoop.com/salt-typhoon-us-telecom-hack-earth-estries-trend-micro-report/</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort</a><br/><a href='https://www.bleepingcomputer.com/news/security/state-hackers-turn-to-massive-orb-proxy-networks-to-evade-detection/' target='_blank' rel='noreferrer noopener'>https://www.bleepingcomputer.com/news/security/state-hackers-turn-to-massive-orb-proxy-networks-to-evade-detection/</a><b><br/><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Frogs! Join host Selena Larson and guest host, Sarah Sabotka, explore the evolving tactics of China-based nation-state threat actors with guest Mark Kelly, Staff Threat Researcher at Proofpoint. They focus on TA415 (APT41 or Brass Typhoon), examining its combination of cybercrime and state-sponsored espionage. From the Voldemort malware campaign to targeting critical infrastructure, Mark sheds light on how these actors leverage tools like Google Sheets for command and control, exploit vulnerabilities, and adapt to evade detection.<br/><br/>The discussion also highlights:<ul><li>the strategic importance of edge devices, pre-positioning for geopolitical escalations, and the intersection of espionage, gaming, and cybercrime </li><li>Operational Relay Boxes (ORBs), covert networks used by Chinese Advanced Persistent Threat (APT) groups to mask cyber activities </li><li>exploitation of non-traditional systems and vulnerabilities</li><li>the impact of compromised consumer devices on global cybersecurity</li></ul><b><br/></b>Resources mentioned:<br/><a href='https://www.nytimes.com/2024/10/26/us/politics/salt-typhoon-hack-what-we-know.html' target='_blank' rel='noreferrer noopener'>https://www.nytimes.com/2024/10/26/us/politics/salt-typhoon-hack-what-we-know.html</a><br/><a href='https://cyberscoop.com/salt-typhoon-us-telecom-hack-earth-estries-trend-micro-report/' target='_blank' rel='noreferrer noopener'>https://cyberscoop.com/salt-typhoon-us-telecom-hack-earth-estries-trend-micro-report/</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort</a><br/><a href='https://www.bleepingcomputer.com/news/security/state-hackers-turn-to-massive-orb-proxy-networks-to-evade-detection/' target='_blank' rel='noreferrer noopener'>https://www.bleepingcomputer.com/news/security/state-hackers-turn-to-massive-orb-proxy-networks-to-evade-detection/</a><b><br/><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491607-stealth-scale-and-strategy-exploring-china-s-covert-network-tactics.mp3" length="35645004" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qwe0v88v0zhhbn8jyldaicedplmv?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/63110086</guid>
    <pubDate>Tue, 03 Dec 2024 04:00:07 -0500</pubDate>
    <itunes:duration>2968</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish</itunes:title>
    <title>Scams, Smishing, and Safety Nets: How Emerging Threats Catches Phish</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Pals! Join host Selena Larson and guest, Genina Po, Threat Researcher at Emerging Threats at Proofpoint. She shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures. Using tools like Suricata to create detections for malicious activity, she maps out her approach to writing rules that identify and block these threats.  The goal? Equip companies to stay secure, and encour...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Pals! Join host Selena Larson and guest, Genina Po, Threat Researcher at Emerging Threats at Proofpoint. She shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures. Using tools like Suricata to create detections for malicious activity, she maps out her approach to writing rules that identify and block these threats.<br/><br/>The goal? Equip companies to stay secure, and encourage listeners with the skills to spot and prevent scams on their own. Genina shares her journey tracking pig butchering scams through thousands of domains and URLs. She reveals patterns—certain headers and markers—that help identify these sites amid a flood of data, and she describes the challenges in detection, as scammers increasingly vary their setups to evade filters. <br/><br/>Also discussed:<ul><li>proactive measures against phishing and fraud sites, with Proofpoint using &quot;takedown&quot; services to remove malicious domains, disrupting scams before they impact users</li><li>the importance of questioning biases, particularly in cyber threat intelligence where assumptions can shape classifications and responses</li><li>collaboration with Chainalysis to connect various scams through cryptocurrency wallets, showing cross-over between different fraud types</li></ul><b>Resources mentioned:<br/></b>Book: <a href='https://www.amazon.com/Why-Fish-Dont-Exist-Hidden/dp/1501160346/ref=sr_1_1?crid=3QDRFNM1FUD84&amp;dib=eyJ2IjoiMSJ9.1I2z6Ln4C11Np_RMd7KRnVAkMh8B_by-m3QVU1_5TCD3QJZJwVtUmLK-41AR9eN9AsCGAC9NOGB7Yx2ju5jD5EtzLWm4e6lsddmLgDPbiqTIlt2CEzjAug-GoudDsBEI-l19bcrSYw86JUnaMdFT_wsgDZSeOJMpDJAo3d8JAW5OsTMCcipZJkYJr3W1zW1IJigi-JthMoCu8Vm-sTc8aCVoHaiTu-ggf7jsFyBY1hE.mvrXb3tE9nLjL3DhmYjr0bSrZeRgxhjQO6Rq_FCis-c&amp;dib_tag=se&amp;keywords=why+fish+don%27t+exist&amp;qid=1731352701&amp;sprefix=why+fish+dont+exist%2Caps%2C100&amp;sr=8-1' target='_blank' rel='noreferrer noopener'>Why Fish Don’t Exist by Lulu Miller</a><b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><b><br/>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Pals! Join host Selena Larson and guest, Genina Po, Threat Researcher at Emerging Threats at Proofpoint. She shares how she tackles emerging cyber threats, breaking down the process of turning data into detection signatures. Using tools like Suricata to create detections for malicious activity, she maps out her approach to writing rules that identify and block these threats.<br/><br/>The goal? Equip companies to stay secure, and encourage listeners with the skills to spot and prevent scams on their own. Genina shares her journey tracking pig butchering scams through thousands of domains and URLs. She reveals patterns—certain headers and markers—that help identify these sites amid a flood of data, and she describes the challenges in detection, as scammers increasingly vary their setups to evade filters. <br/><br/>Also discussed:<ul><li>proactive measures against phishing and fraud sites, with Proofpoint using &quot;takedown&quot; services to remove malicious domains, disrupting scams before they impact users</li><li>the importance of questioning biases, particularly in cyber threat intelligence where assumptions can shape classifications and responses</li><li>collaboration with Chainalysis to connect various scams through cryptocurrency wallets, showing cross-over between different fraud types</li></ul><b>Resources mentioned:<br/></b>Book: <a href='https://www.amazon.com/Why-Fish-Dont-Exist-Hidden/dp/1501160346/ref=sr_1_1?crid=3QDRFNM1FUD84&amp;dib=eyJ2IjoiMSJ9.1I2z6Ln4C11Np_RMd7KRnVAkMh8B_by-m3QVU1_5TCD3QJZJwVtUmLK-41AR9eN9AsCGAC9NOGB7Yx2ju5jD5EtzLWm4e6lsddmLgDPbiqTIlt2CEzjAug-GoudDsBEI-l19bcrSYw86JUnaMdFT_wsgDZSeOJMpDJAo3d8JAW5OsTMCcipZJkYJr3W1zW1IJigi-JthMoCu8Vm-sTc8aCVoHaiTu-ggf7jsFyBY1hE.mvrXb3tE9nLjL3DhmYjr0bSrZeRgxhjQO6Rq_FCis-c&amp;dib_tag=se&amp;keywords=why+fish+don%27t+exist&amp;qid=1731352701&amp;sprefix=why+fish+dont+exist%2Caps%2C100&amp;sr=8-1' target='_blank' rel='noreferrer noopener'>Why Fish Don’t Exist by Lulu Miller</a><b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><b><br/>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491608-scams-smishing-and-safety-nets-how-emerging-threats-catches-phish.mp3" length="36844202" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/en56b1vvphbq2cobnxaxg0050i1e?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/62744117</guid>
    <pubDate>Fri, 15 Nov 2024 04:00:06 -0500</pubDate>
    <itunes:duration>3067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Pig Butcher Scammers Put Job Seekers On The Menu</itunes:title>
    <title>Pig Butcher Scammers Put Job Seekers On The Menu</title>
    <itunes:summary><![CDATA[Send us fan mail! A note to our listeners, this episode contains some content our listeners might find upsetting including mentions of human trafficking.   Hello to all our Pumpkin Spice Cyber Friends! Join host Selena Larson  and guest host, Sarah Sabotka as they chat with senior threat researcher and fraud expert Tim Kromphardt. They talk about the world of pig butchering and crypto romance scams, where Tim discusses how these scams manipulate victims' feelings, making it incredib...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>A note to our listeners, this episode contains some content our listeners might find upsetting including mentions of human trafficking. <br/><br/>Hello to all our Pumpkin Spice Cyber Friends! Join host Selena Larson  and guest host, Sarah Sabotka as they chat with senior threat researcher and fraud expert Tim Kromphardt. They talk about the world of pig butchering and crypto romance scams, where Tim discusses how these scams manipulate victims&apos; feelings, making it incredibly hard to escape, even when presented with evidence of the scam. And how these threat actors have expanded their enterprises to include job scamming. He explains the challenges of tracking funds through cryptocurrency systems, and why these scams are so profitable.  <br/><br/>The episode highlights the need for victims to speak out and share their stories without shame, breaking the cycle and raising awareness.<br/><br/>Also discussed:<ul><li>how psychological manipulation can be just as damaging as technical vulnerabilities</li><li>resources for victims, and how people can identify hallmarks of these types of scams </li><li>the role of automation and AI in scaling scams</li></ul><br/><br/><br/>Resources mentioned:<br/>globalantiscam.org<br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>A note to our listeners, this episode contains some content our listeners might find upsetting including mentions of human trafficking. <br/><br/>Hello to all our Pumpkin Spice Cyber Friends! Join host Selena Larson  and guest host, Sarah Sabotka as they chat with senior threat researcher and fraud expert Tim Kromphardt. They talk about the world of pig butchering and crypto romance scams, where Tim discusses how these scams manipulate victims&apos; feelings, making it incredibly hard to escape, even when presented with evidence of the scam. And how these threat actors have expanded their enterprises to include job scamming. He explains the challenges of tracking funds through cryptocurrency systems, and why these scams are so profitable.  <br/><br/>The episode highlights the need for victims to speak out and share their stories without shame, breaking the cycle and raising awareness.<br/><br/>Also discussed:<ul><li>how psychological manipulation can be just as damaging as technical vulnerabilities</li><li>resources for victims, and how people can identify hallmarks of these types of scams </li><li>the role of automation and AI in scaling scams</li></ul><br/><br/><br/>Resources mentioned:<br/>globalantiscam.org<br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491609-pig-butcher-scammers-put-job-seekers-on-the-menu.mp3" length="28453654" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s0z6wvn2hzaqcd4j2eepgy2w28e5?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/62545343</guid>
    <pubDate>Tue, 29 Oct 2024 14:21:50 -0400</pubDate>
    <itunes:duration>2368</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Under Siege: How Hackers Exploit Cloud Vulnerabilities</itunes:title>
    <title>Under Siege: How Hackers Exploit Cloud Vulnerabilities</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Cyber Ghosts! Join host Selena Larson  as she chats with Eilon Bendet– Cloud Threat Researcher from Proofpoint. ​​From account takeovers to state-sponsored hacks, they uncover how cybercriminals are outsmarting traditional defenses – and why even multi-factor authentication might not be enough to keep them out.   Together, they discuss the complexities of cloud threat detection, including the role of User and Entity Behavior Analytics (UEBA) in ide...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Ghosts! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a>  as she chats with Eilon Bendet– Cloud Threat Researcher from Proofpoint. ​​From account takeovers to state-sponsored hacks, they uncover how cybercriminals are outsmarting traditional defenses – and why even multi-factor authentication might not be enough to keep them out. <br/><br/>Together, they discuss the complexities of cloud threat detection, including the role of User and Entity Behavior Analytics (UEBA) in identifying suspicious activities and preventing account takeovers (ATO). Eilon breaks down two primary ATO threat vectors—credential-based brute force attacks and precision-targeted phishing campaigns. <br/><br/>Also discussed:<ul><li>how these groups exploit cloud environments</li><li>concerning trends such as the rise of reverse proxy-based toolkits and MFA bypass techniques</li><li>the importance of identity-focused defense strategies and how threat actors customize tools to infiltrate cloud systems, steal data, and monetize compromised accounts</li></ul><br/>Resources mentioned:<br/>MACT or malicious applications blog: https://www.proofpoint.com/us/blog/cloud-security/revisiting-mact-malicious-applications-credible-cloud-tenants<b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Cyber Ghosts! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a>  as she chats with Eilon Bendet– Cloud Threat Researcher from Proofpoint. ​​From account takeovers to state-sponsored hacks, they uncover how cybercriminals are outsmarting traditional defenses – and why even multi-factor authentication might not be enough to keep them out. <br/><br/>Together, they discuss the complexities of cloud threat detection, including the role of User and Entity Behavior Analytics (UEBA) in identifying suspicious activities and preventing account takeovers (ATO). Eilon breaks down two primary ATO threat vectors—credential-based brute force attacks and precision-targeted phishing campaigns. <br/><br/>Also discussed:<ul><li>how these groups exploit cloud environments</li><li>concerning trends such as the rise of reverse proxy-based toolkits and MFA bypass techniques</li><li>the importance of identity-focused defense strategies and how threat actors customize tools to infiltrate cloud systems, steal data, and monetize compromised accounts</li></ul><br/>Resources mentioned:<br/>MACT or malicious applications blog: https://www.proofpoint.com/us/blog/cloud-security/revisiting-mact-malicious-applications-credible-cloud-tenants<b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491610-under-siege-how-hackers-exploit-cloud-vulnerabilities.mp3" length="23894259" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/fgt7yxhwj3vnmzmqx2corty90a1r?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/62376218</guid>
    <pubDate>Tue, 15 Oct 2024 13:30:36 -0400</pubDate>
    <itunes:duration>1988</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Champagne Attack Chains on a Kool-Aid Budget</itunes:title>
    <title>Champagne Attack Chains on a Kool-Aid Budget</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our Pumpkin Spice cyber friends! Join host Selena Larson and today’s co-host, Tim Kromphardt, as they chat with Joe Wise, Senior Threat Researcher and Kyle Cucci, Staff Threat Researcher both from Proofpoint.  Together, they unpack recent campaigns involving the abuse of legitimate services, particularly focusing on the clever tactics used by cybercriminals to evade detection.Joe and Kyle discuss a fascinating trend where attackers are leveraging Cloudflare’s te...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Pumpkin Spice cyber friends! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, Tim Kromphardt, as they chat with Joe Wise, Senior Threat Researcher and Kyle Cucci, Staff Threat Researcher both from Proofpoint.<br/><br/>Together, they unpack recent campaigns involving the abuse of legitimate services, particularly focusing on the clever tactics used by cybercriminals to evade detection.Joe and Kyle discuss a fascinating trend where attackers are leveraging Cloudflare’s temporary tunnels, bundling Python packages, and deploying a range of malware like Xworm and Venom Rat. They explore the increasing abuse of legitimate services like Google Drive, Adobe Acrobat, and Dropbox, which allow attackers to blend in with regular business traffic. The conversation also touches on a range of threat clusters, including Exormactor and Voldemort malware, and TA2541, who have consistently leveraged Google Drive URLs to spread malicious content. <br/><br/>Also discussed:<br/><ul><li>the challenge of detecting and mitigating these types of threats and the importance of staying ahead of the evolving attack strategies </li><li>the motivations behind these campaigns</li><li>why traditional defense mechanisms may fall short</li></ul><br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/scammer-abuses-microsoft-365-tenants-relaying-through-proofpoint-servers-deliver' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/scammer-abuses-microsoft-365-tenants-relaying-through-proofpoint-servers-deliver</a><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<br/><br/><b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our Pumpkin Spice cyber friends! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, Tim Kromphardt, as they chat with Joe Wise, Senior Threat Researcher and Kyle Cucci, Staff Threat Researcher both from Proofpoint.<br/><br/>Together, they unpack recent campaigns involving the abuse of legitimate services, particularly focusing on the clever tactics used by cybercriminals to evade detection.Joe and Kyle discuss a fascinating trend where attackers are leveraging Cloudflare’s temporary tunnels, bundling Python packages, and deploying a range of malware like Xworm and Venom Rat. They explore the increasing abuse of legitimate services like Google Drive, Adobe Acrobat, and Dropbox, which allow attackers to blend in with regular business traffic. The conversation also touches on a range of threat clusters, including Exormactor and Voldemort malware, and TA2541, who have consistently leveraged Google Drive URLs to spread malicious content. <br/><br/>Also discussed:<br/><ul><li>the challenge of detecting and mitigating these types of threats and the importance of staying ahead of the evolving attack strategies </li><li>the motivations behind these campaigns</li><li>why traditional defense mechanisms may fall short</li></ul><br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/malware-must-not-be-named-suspected-espionage-campaign-delivers-voldemort</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/scammer-abuses-microsoft-365-tenants-relaying-through-proofpoint-servers-deliver' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/scammer-abuses-microsoft-365-tenants-relaying-through-proofpoint-servers-deliver</a><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<br/><br/><b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491611-champagne-attack-chains-on-a-kool-aid-budget.mp3" length="24254073" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nm7omrmawmeibp9o7og6ggqovt18?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/62117013</guid>
    <pubDate>Mon, 30 Sep 2024 04:00:01 -0400</pubDate>
    <itunes:duration>2018</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guarding the Vote: Unmasking Cyber Threats in Election Season</itunes:title>
    <title>Guarding the Vote: Unmasking Cyber Threats in Election Season</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our cyber citizens! Join host Selena Larson and today’s co-host, Tim Kromphardt, as they chat with Joshua Miller, Senior Threat Researcher and Rob Kinner, Senior Threat Analyst both from Proofpoint.  With election season on the horizon, cyber attackers are sharpening their tactics—impersonating government agencies, emailing journalists, and crafting sophisticated phishing schemes. But how real is the threat? And what can be done to protect our democracy from the...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber citizens! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, Tim Kromphardt, as they chat with Joshua Miller, Senior Threat Researcher and Rob Kinner, Senior Threat Analyst both from Proofpoint.<br/><br/>With election season on the horizon, cyber attackers are sharpening their tactics—impersonating government agencies, emailing journalists, and crafting sophisticated phishing schemes. But how real is the threat? And what can be done to protect our democracy from the digital shadows? Today, we pull back the curtain on the unseen battles being fought in cyberspace and what it means for voters, journalists, and defenders alike.<br/><br/>The discussion covers a range of election threats, from malicious domains, impersonation, and typo-squatting to sophisticated credential phishing campaigns that exploit government and election-related themes.<br/><br/>Also discussed:<ul><li>how state-sponsored actors from DPRK, Russia, and China are interested in espionage around election related topics </li><li>the impersonation of various government entities for phishing purposes, revealing the creativity and resourcefulness of threat actors</li><li>while cyber threats are pervasive, the integrity of the voting process remains strong, backed by robust defenses and ongoing efforts by dedicated professionals</li></ul><b><br/>Resources mentioned:<br/></b><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a><br/><br/><a href='https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/media-coverage-doesnt-deter-actor-threatening-democratic-voters' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/media-coverage-doesnt-deter-actor-threatening-democratic-voters</a><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber citizens! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, Tim Kromphardt, as they chat with Joshua Miller, Senior Threat Researcher and Rob Kinner, Senior Threat Analyst both from Proofpoint.<br/><br/>With election season on the horizon, cyber attackers are sharpening their tactics—impersonating government agencies, emailing journalists, and crafting sophisticated phishing schemes. But how real is the threat? And what can be done to protect our democracy from the digital shadows? Today, we pull back the curtain on the unseen battles being fought in cyberspace and what it means for voters, journalists, and defenders alike.<br/><br/>The discussion covers a range of election threats, from malicious domains, impersonation, and typo-squatting to sophisticated credential phishing campaigns that exploit government and election-related themes.<br/><br/>Also discussed:<ul><li>how state-sponsored actors from DPRK, Russia, and China are interested in espionage around election related topics </li><li>the impersonation of various government entities for phishing purposes, revealing the creativity and resourcefulness of threat actors</li><li>while cyber threats are pervasive, the integrity of the voting process remains strong, backed by robust defenses and ongoing efforts by dedicated professionals</li></ul><b><br/>Resources mentioned:<br/></b><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a><br/><br/><a href='https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/media-coverage-doesnt-deter-actor-threatening-democratic-voters' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/media-coverage-doesnt-deter-actor-threatening-democratic-voters</a><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491612-guarding-the-vote-unmasking-cyber-threats-in-election-season.mp3" length="23520617" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xsvq71763w7ybje7rdz0eiafjcxe?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/61880131</guid>
    <pubDate>Tue, 17 Sep 2024 04:00:02 -0400</pubDate>
    <itunes:duration>1957</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Very Mindful, Very APT: Inside the Activity of Current Espionage Actors</itunes:title>
    <title>Very Mindful, Very APT: Inside the Activity of Current Espionage Actors</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our mindful and demure cyber sleuths! Join host Selena Larson and today’s co-host, Sarah Sabotka as they chat with Joshua Miller and Greg Lesnewich, Threat Researchers at Proofpoint about the ever-evolving world of advanced persistent threats (APTs).  The team unravels the latest espionage tactics of threat actors from Iran, North Korea, and Russia, exploring everything from Iran’s sophisticated social engineering campaigns to North Korea’s customized Mac malwar...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our mindful and demure cyber sleuths! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Sarah Sabotka</a> as they chat with Joshua Miller and Greg Lesnewich, Threat Researchers at Proofpoint about the ever-evolving world of advanced persistent threats (APTs).<br/><br/>The team unravels the latest espionage tactics of threat actors from Iran, North Korea, and Russia, exploring everything from Iran’s sophisticated social engineering campaigns to North Korea’s customized Mac malware.<br/><br/><br/>They also highlight the increasing interest in MacOS malware in the cybercrime landscape and examine examine the threat posed by a group targeting AI researchers with unique malware like &quot;SugarGh0st RAT.&quot;<br/><br/>Also discussed:<ul><li>the quirky and often amusing names given to malware campaigns in the cybersecurity world.</li><li>unexpected connections between cybersecurity and pop culture, featuring a discussion on how celebrities like Taylor Swift handle digital security.</li><li>what recent activity suggests about the actors’ changing tactics.</li></ul><br/><b>Resources mentioned:</b><br/><a href='https://youtu.be/HEovdEHjF5s?si=-luiunlAyxOjrL64' target='_blank' rel='noreferrer noopener'>SleuthCon Talk</a>: Presenter, Selena Larson<br/><br/><a href='https://citizenlab.ca/2024/08/sophisticated-phishing-targets-russias-perceived-enemies-around-the-globe/' target='_blank' rel='noreferrer noopener'>Rivers of Phish</a> from CitizenLab<br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign</a><br/><br/><a href='https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn' target='_blank' rel='noreferrer noopener'>https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds</a><br/><br/><a href='https://www.theguardian.com/music/shortcuts/2019/jan/29/digital-security-taylor-swift-facetime-privacy-bug-breaches' target='_blank' rel='noreferrer noopener'>https://www.theguardian.com/music/shortcuts/2019/jan/29/digital-security-taylor-swift-facetime-privacy-bug-breaches</a><br/><br/><a href='https://www.youtube.com/watch?v=LYHmTjFW-nY' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=LYHmTjFW-nY</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-artificial-sweetener-sugargh0st-rat-used-target-american' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-artificial-sweetener-sugargh0st-rat-used-target-american</a> <br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out ou</a>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our mindful and demure cyber sleuths! Join host <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Selena Larson</a> and today’s co-host, <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Sarah Sabotka</a> as they chat with Joshua Miller and Greg Lesnewich, Threat Researchers at Proofpoint about the ever-evolving world of advanced persistent threats (APTs).<br/><br/>The team unravels the latest espionage tactics of threat actors from Iran, North Korea, and Russia, exploring everything from Iran’s sophisticated social engineering campaigns to North Korea’s customized Mac malware.<br/><br/><br/>They also highlight the increasing interest in MacOS malware in the cybercrime landscape and examine examine the threat posed by a group targeting AI researchers with unique malware like &quot;SugarGh0st RAT.&quot;<br/><br/>Also discussed:<ul><li>the quirky and often amusing names given to malware campaigns in the cybersecurity world.</li><li>unexpected connections between cybersecurity and pop culture, featuring a discussion on how celebrities like Taylor Swift handle digital security.</li><li>what recent activity suggests about the actors’ changing tactics.</li></ul><br/><b>Resources mentioned:</b><br/><a href='https://youtu.be/HEovdEHjF5s?si=-luiunlAyxOjrL64' target='_blank' rel='noreferrer noopener'>SleuthCon Talk</a>: Presenter, Selena Larson<br/><br/><a href='https://citizenlab.ca/2024/08/sophisticated-phishing-targets-russias-perceived-enemies-around-the-globe/' target='_blank' rel='noreferrer noopener'>Rivers of Phish</a> from CitizenLab<br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta450-uses-embedded-links-pdf-attachments-latest-campaign</a><br/><br/><a href='https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn' target='_blank' rel='noreferrer noopener'>https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds</a><br/><br/><a href='https://www.theguardian.com/music/shortcuts/2019/jan/29/digital-security-taylor-swift-facetime-privacy-bug-breaches' target='_blank' rel='noreferrer noopener'>https://www.theguardian.com/music/shortcuts/2019/jan/29/digital-security-taylor-swift-facetime-privacy-bug-breaches</a><br/><br/><a href='https://www.youtube.com/watch?v=LYHmTjFW-nY' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=LYHmTjFW-nY</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-artificial-sweetener-sugargh0st-rat-used-target-american' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-artificial-sweetener-sugargh0st-rat-used-target-american</a> <br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out ou</a>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491613-very-mindful-very-apt-inside-the-activity-of-current-espionage-actors.mp3" length="35738198" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/svf4800rl1o443wpic8yn06nroku?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/61255864</guid>
    <pubDate>Wed, 04 Sep 2024 04:00:02 -0400</pubDate>
    <itunes:duration>2975</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rebel Security Training: Cyber Lessons from A Galaxy Far, Far Away</itunes:title>
    <title>Rebel Security Training: Cyber Lessons from A Galaxy Far, Far Away</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello, cyber rebels! Ever wondered what lightsabers, the Force, and intergalactic battles have in common with the world of cybersecurity? Welcome to a special episode of the Discarded Podcast. Join host Selena and co-host Greg Lesnewich, Senior Threat Researcher at Proofpoint, along with our guest, Eric Geller, cybersecurity reporter and host of the Hoth Takes Star Wars podcast, as they dive into the fascinating intersection of Star Wars and cybersecurity. He reveals how the...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, cyber rebels! Ever wondered what lightsabers, the Force, and intergalactic battles have in common with the world of cybersecurity? Welcome to a special episode of the Discarded Podcast. Join host Selena and co-host Greg Lesnewich, Senior Threat Researcher at Proofpoint, along with our guest, Eric Geller, cybersecurity reporter and host of the Hoth Takes Star Wars podcast, as they dive into the fascinating intersection of Star Wars and cybersecurity. He reveals how the tactics and strategies from a galaxy far, far away can be applied to modern-day digital defense.<br/><br/>Greg and Eric share their love for Star Wars while drawing parallels between iconic moments from the saga and modern cybersecurity practices. Ever wondered how the Rebels&apos; infiltration of the Death Star reflects real-world hacking techniques? Or how the Empire&apos;s security flaws could be lessons for today&apos;s digital defenses? We&apos;ve got you covered. They highlight how living off the land techniques, identity protection failures, and internal security oversights in the Star Wars universe can teach us valuable lessons for defending against cyber threats.<br/><br/>From red teaming with Han and Chewbacca to intelligence analysis with Princess Leia, and even hardware hacking with Babu Frik, we cover a broad spectrum of cyber roles through the lens of Star Wars. We also delve into who would make the best CISO in the Star Wars universe, with some surprising nominations and entertaining analogies.<br/><br/>Whether you&apos;re a Star Wars enthusiast or a cybersecurity professional, this episode provides a unique and entertaining perspective on the skills and strategies essential for both realms. Tune in for a fun and insightful conversation that bridges the gap between fiction and reality in the most engaging way possible.<br/><br/><br/><b>Resources mentioned:</b><br/><br/><a href='https://open.spotify.com/show/20wslEusMMxzQYXcYQ7JZz?si=072f69f6839b4202' target='_blank' rel='noreferrer noopener'>Hoth Takes</a> (podcast)<br/><a href='https://www.nist.gov/cyberframework' target='_blank' rel='noreferrer noopener'>NIST Framework</a><br/><a href='https://www.wired.com/author/eric-geller/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/author/eric-geller/</a><b><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b><br/><b><br/>Subscribe &amp; Follow:</b><br/><b></b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, cyber rebels! Ever wondered what lightsabers, the Force, and intergalactic battles have in common with the world of cybersecurity? Welcome to a special episode of the Discarded Podcast. Join host Selena and co-host Greg Lesnewich, Senior Threat Researcher at Proofpoint, along with our guest, Eric Geller, cybersecurity reporter and host of the Hoth Takes Star Wars podcast, as they dive into the fascinating intersection of Star Wars and cybersecurity. He reveals how the tactics and strategies from a galaxy far, far away can be applied to modern-day digital defense.<br/><br/>Greg and Eric share their love for Star Wars while drawing parallels between iconic moments from the saga and modern cybersecurity practices. Ever wondered how the Rebels&apos; infiltration of the Death Star reflects real-world hacking techniques? Or how the Empire&apos;s security flaws could be lessons for today&apos;s digital defenses? We&apos;ve got you covered. They highlight how living off the land techniques, identity protection failures, and internal security oversights in the Star Wars universe can teach us valuable lessons for defending against cyber threats.<br/><br/>From red teaming with Han and Chewbacca to intelligence analysis with Princess Leia, and even hardware hacking with Babu Frik, we cover a broad spectrum of cyber roles through the lens of Star Wars. We also delve into who would make the best CISO in the Star Wars universe, with some surprising nominations and entertaining analogies.<br/><br/>Whether you&apos;re a Star Wars enthusiast or a cybersecurity professional, this episode provides a unique and entertaining perspective on the skills and strategies essential for both realms. Tune in for a fun and insightful conversation that bridges the gap between fiction and reality in the most engaging way possible.<br/><br/><br/><b>Resources mentioned:</b><br/><br/><a href='https://open.spotify.com/show/20wslEusMMxzQYXcYQ7JZz?si=072f69f6839b4202' target='_blank' rel='noreferrer noopener'>Hoth Takes</a> (podcast)<br/><a href='https://www.nist.gov/cyberframework' target='_blank' rel='noreferrer noopener'>NIST Framework</a><br/><a href='https://www.wired.com/author/eric-geller/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/author/eric-geller/</a><b><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b><br/><b><br/>Subscribe &amp; Follow:</b><br/><b></b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491614-rebel-security-training-cyber-lessons-from-a-galaxy-far-far-away.mp3" length="41198432" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ypsul425ddq309kzmtvcim3l43z6?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/61087057</guid>
    <pubDate>Tue, 20 Aug 2024 04:00:02 -0400</pubDate>
    <itunes:duration>3430</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Art of Frustrating Hackers: Diving Into the DEaTH Cycle with Randy Pargman</itunes:title>
    <title>The Art of Frustrating Hackers: Diving Into the DEaTH Cycle with Randy Pargman</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello, Cyber Stars! In today's episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by Randy Pargman, Director of Threat Detection at Proofpoint. Randy shares his extensive experience in cybersecurity, from working at the FBI and understanding law enforcement’s role in cyber defense, to endpoint detection and response, to his current role at Proofpoint.  We explore the relentless cat-and-mouse game between cyber defenders and threat actors. Rand...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Stars! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by Randy Pargman, Director of Threat Detection at Proofpoint. Randy shares his extensive experience in cybersecurity, from working at the FBI and understanding law enforcement’s role in cyber defense, to endpoint detection and response, to his current role at Proofpoint.<br/><br/>We explore the relentless cat-and-mouse game between cyber defenders and threat actors. Randy discusses the importance of Detection Engineering and Threat Hunting (DEATH) and how these disciplines work together to outsmart cybercriminals. He also highlights the significance of log data retention and how investing in longer retention periods can drastically improve the efficacy of detection measures.<br/><br/>Randy touches on the upcoming DEATHCon, a must-attend event for cybersecurity professionals. He shares fascinating stories and analogies, making complex cybersecurity concepts accessible and engaging.<br/><br/>We also talk about: <ul><li>the concept of the &quot;pyramid of pain&quot; and how spending too much time on IOCs can be a losing battle against agile threat actors</li><li>the value of empathy and collaboration among security teams</li><li>practical steps for building shared lab environments</li></ul><b>Resources mentioned:</b><br/><b></b><br/><a href='https://deathcon.io/' target='_blank' rel='noreferrer noopener'>DeathCON</a><br/><a href='https://www.operation-endgame.com/' target='_blank' rel='noreferrer noopener'>Operation Endgame</a> <br/>Clipboard to Compromise Blog: <a href='https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn</a><br/>DFIR Report Labs: <a href='https://thedfirreport.com/services/dfir-labs/' target='_blank' rel='noreferrer noopener'>https://thedfirreport.com/services/dfir-labs/</a><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Stars! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by Randy Pargman, Director of Threat Detection at Proofpoint. Randy shares his extensive experience in cybersecurity, from working at the FBI and understanding law enforcement’s role in cyber defense, to endpoint detection and response, to his current role at Proofpoint.<br/><br/>We explore the relentless cat-and-mouse game between cyber defenders and threat actors. Randy discusses the importance of Detection Engineering and Threat Hunting (DEATH) and how these disciplines work together to outsmart cybercriminals. He also highlights the significance of log data retention and how investing in longer retention periods can drastically improve the efficacy of detection measures.<br/><br/>Randy touches on the upcoming DEATHCon, a must-attend event for cybersecurity professionals. He shares fascinating stories and analogies, making complex cybersecurity concepts accessible and engaging.<br/><br/>We also talk about: <ul><li>the concept of the &quot;pyramid of pain&quot; and how spending too much time on IOCs can be a losing battle against agile threat actors</li><li>the value of empathy and collaboration among security teams</li><li>practical steps for building shared lab environments</li></ul><b>Resources mentioned:</b><br/><b></b><br/><a href='https://deathcon.io/' target='_blank' rel='noreferrer noopener'>DeathCON</a><br/><a href='https://www.operation-endgame.com/' target='_blank' rel='noreferrer noopener'>Operation Endgame</a> <br/>Clipboard to Compromise Blog: <a href='https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn</a><br/>DFIR Report Labs: <a href='https://thedfirreport.com/services/dfir-labs/' target='_blank' rel='noreferrer noopener'>https://thedfirreport.com/services/dfir-labs/</a><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491615-the-art-of-frustrating-hackers-diving-into-the-death-cycle-with-randy-pargman.mp3" length="37896342" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/monwoq6wd0522v3xd5275fzrsmsp?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60898770</guid>
    <pubDate>Tue, 06 Aug 2024 04:00:03 -0400</pubDate>
    <itunes:duration>3155</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hunt for Cyber Criminals: A Deep Dive with Wired&#39;s Andy Greenberg</itunes:title>
    <title>The Hunt for Cyber Criminals: A Deep Dive with Wired&#39;s Andy Greenberg</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello, Cyber Stars! In today's episode of the Discarded Podcast, hosts Selena Larson and Pim Trouerbach are joined by Andy Greenberg, Senior Writer at WIRED. Known for his deep dives into the world of hacking, cybersecurity, and surveillance, Andy shares his journey of uncovering and telling compelling stories about the digital underworld.  The conversation kicks off with Andy detailing his extensive experience in cybersecurity journalism and his knack for long-form storytel...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Stars! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Pim Trouerbach are joined by Andy Greenberg, Senior Writer at WIRED. Known for his deep dives into the world of hacking, cybersecurity, and surveillance, Andy shares his journey of uncovering and telling compelling stories about the digital underworld.<br/><br/>The conversation kicks off with Andy detailing his extensive experience in cybersecurity journalism and his knack for long-form storytelling. He shares insights into his acclaimed Wired article on the Mirai botnet hackers and discusses his latest book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. <b><br/><br/><br/>We also talk about: </b><ul><li>the intricate world of cryptocurrency and its unintended consequence of fueling ransomware attacks </li><li>the rise of pig butchering scams, now dwarfing ransomware in financial impact</li><li>the ethical dilemmas and real-world consequences of cybercrime</li></ul><b><br/>Resources mentioned:</b><br/><a href='https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405' target='_blank' rel='noreferrer noopener'>Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin&apos;s Most Dangerous Hackers</a> by Andy Greenberg<br/><a href='https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095' target='_blank' rel='noreferrer noopener'>Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency</a> by Andy Greenberg<br/><a href='https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/</a><br/><a href='https://www.wired.com/story/crypto-home-invasion-crime-ring/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/crypto-home-invasion-crime-ring/</a><br/><a href='https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/</a> <b><br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/></b><br/><b></b><br/><b>Subscribe &amp; Follow:</b><br/><b>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.</b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Stars! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Pim Trouerbach are joined by Andy Greenberg, Senior Writer at WIRED. Known for his deep dives into the world of hacking, cybersecurity, and surveillance, Andy shares his journey of uncovering and telling compelling stories about the digital underworld.<br/><br/>The conversation kicks off with Andy detailing his extensive experience in cybersecurity journalism and his knack for long-form storytelling. He shares insights into his acclaimed Wired article on the Mirai botnet hackers and discusses his latest book, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. <b><br/><br/><br/>We also talk about: </b><ul><li>the intricate world of cryptocurrency and its unintended consequence of fueling ransomware attacks </li><li>the rise of pig butchering scams, now dwarfing ransomware in financial impact</li><li>the ethical dilemmas and real-world consequences of cybercrime</li></ul><b><br/>Resources mentioned:</b><br/><a href='https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405' target='_blank' rel='noreferrer noopener'>Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin&apos;s Most Dangerous Hackers</a> by Andy Greenberg<br/><a href='https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095' target='_blank' rel='noreferrer noopener'>Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency</a> by Andy Greenberg<br/><a href='https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/</a><br/><a href='https://www.wired.com/story/crypto-home-invasion-crime-ring/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/crypto-home-invasion-crime-ring/</a><br/><a href='https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/tigran-gambaryan-us-congress-resolution-hostage-nigeria/</a> <b><br/><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/></b><br/><b></b><br/><b>Subscribe &amp; Follow:</b><br/><b>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.</b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491616-the-hunt-for-cyber-criminals-a-deep-dive-with-wired-s-andy-greenberg.mp3" length="40067831" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/z40faicbkzeo72klgjo6yt61334a?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60789684</guid>
    <pubDate>Wed, 24 Jul 2024 11:46:18 -0400</pubDate>
    <itunes:duration>3336</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Have you heard: Only Malware in the Building?</itunes:title>
    <title>Have you heard: Only Malware in the Building?</title>
    <itunes:summary><![CDATA[Send us fan mail! Check out new episodes of Only Malware in the Building wherever you listen to podcasts: https://thecyberwire.com/podcasts/only-malware-in-the-building]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Check out new episodes of Only Malware in the Building wherever you listen to podcasts:<br/>https://thecyberwire.com/podcasts/only-malware-in-the-building]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Check out new episodes of Only Malware in the Building wherever you listen to podcasts:<br/>https://thecyberwire.com/podcasts/only-malware-in-the-building]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491617-have-you-heard-only-malware-in-the-building.mp3" length="2312900" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zfgdwicu0cx2pv9vkke79wry3h63?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60696283</guid>
    <pubDate>Mon, 15 Jul 2024 09:36:18 -0400</pubDate>
    <itunes:duration>189</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques</itunes:title>
    <title>Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello, Cyber Pirates! In today's episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, Staff Threat Researcher at Proofpoint. Dive with us into the world of cyber attacks as Kyle breaks down the intricacies of evasion techniques used by threat actors. From defense evasion to anti-sandboxing and anti-reversing methods, Kyle sheds light on how modern malware ensures its survival. Discover the evolution and increasing sophistication ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Pirates! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, Staff Threat Researcher at Proofpoint. Dive with us into the world of cyber attacks as Kyle breaks down the intricacies of evasion techniques used by threat actors. From defense evasion to anti-sandboxing and anti-reversing methods, Kyle sheds light on how modern malware ensures its survival. Discover the evolution and increasing sophistication of these techniques, and learn about specific malware families like WikiLoader, Remcos, and the notorious Loki Bot.<br/><br/>We then move into how teams of threat hunters, intelligence analysts, and malware reversers work closely to identify new malware techniques and develop robust defenses within sandbox environments. Kyle shares insights into the constant feedback loop between intelligence and detection teams, highlighting how they stay ahead of evolving threats.<br/><br/>We also talk about: <br/><ul><li>evasion strategies, including temperature checks, geofencing, and human detection mechanisms</li><li>the use of publicly available tools by malware authors</li><li>the future of AI and large language models (LLMs) in both aiding and combating cyber threats</li></ul><b>Resources mentioned:</b><br/><ul><li><a href='https://nostarch.com/evasive-malware' target='_blank' rel='noreferrer noopener'>Evasive Malware</a> by Kyle Cucci</li><li>SentinelOne Research: <a href='https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/' target='_blank' rel='noreferrer noopener'>https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/</a></li></ul><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, Cyber Pirates! In today&apos;s episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, Staff Threat Researcher at Proofpoint. Dive with us into the world of cyber attacks as Kyle breaks down the intricacies of evasion techniques used by threat actors. From defense evasion to anti-sandboxing and anti-reversing methods, Kyle sheds light on how modern malware ensures its survival. Discover the evolution and increasing sophistication of these techniques, and learn about specific malware families like WikiLoader, Remcos, and the notorious Loki Bot.<br/><br/>We then move into how teams of threat hunters, intelligence analysts, and malware reversers work closely to identify new malware techniques and develop robust defenses within sandbox environments. Kyle shares insights into the constant feedback loop between intelligence and detection teams, highlighting how they stay ahead of evolving threats.<br/><br/>We also talk about: <br/><ul><li>evasion strategies, including temperature checks, geofencing, and human detection mechanisms</li><li>the use of publicly available tools by malware authors</li><li>the future of AI and large language models (LLMs) in both aiding and combating cyber threats</li></ul><b>Resources mentioned:</b><br/><ul><li><a href='https://nostarch.com/evasive-malware' target='_blank' rel='noreferrer noopener'>Evasive Malware</a> by Kyle Cucci</li><li>SentinelOne Research: <a href='https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/' target='_blank' rel='noreferrer noopener'>https://www.sentinelone.com/blog/blackmamba-chatgpt-polymorphic-malware-a-case-of-scareware-or-a-wake-up-call-for-cyber-security/</a></li></ul><b><br/><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491618-malware-evasion-uncovered-the-battle-against-evolving-malware-techniques.mp3" length="24421699" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rggotha1vq89k9cz8nfq81beisg7?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60644900</guid>
    <pubDate>Tue, 09 Jul 2024 14:10:09 -0400</pubDate>
    <itunes:duration>2032</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Checkmate: Breaking Down Operation Endgame</itunes:title>
    <title>Checkmate: Breaking Down Operation Endgame</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello, cyber sleuths! In today's exciting episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by the brilliant Pim Trouerbach, Senior Reverse Engineer at Proofpoint. Pim gives us the lowdown on this massive law enforcement operation targeting multiple high-profile botnets across the globe, called Operation Endgame, and how this coordinated takedown affects the cybercrime landscape and the significance of arresting the individuals behind these o...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, cyber sleuths! In today&apos;s exciting episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by the brilliant Pim Trouerbach, Senior Reverse Engineer at Proofpoint. Pim gives us the lowdown on this massive law enforcement operation targeting multiple high-profile botnets across the globe, called Operation Endgame, and how this coordinated takedown affects the cybercrime landscape and the significance of arresting the individuals behind these operations.<br/><br/>He also breaks down the different malware impacted including SystemBC, IcedID, Pikabot, Bumblebee, and more.<br/><br/>We also talk about: <b><br/></b><br/><ul><li>the rise and fall of Bumblebee, comparing it to its predecessor, Baza Loader, and contemplating why it didn&apos;t quite live up to its anticipated potential despite its advanced features</li><li>the collaborative efforts between law enforcement and private sector partners, emphasizing the effectiveness of these joint operations in curbing cyber threats</li><li>the high-quality, cinematic videos released as part of Operation Endgame</li></ul><b><br/></b>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown</a><br/><a href='https://www.proofpoint.com/us/threat-insight/post/systembc-christmas-july-socks5-malware-and-exploit-kits' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/threat-insight/post/systembc-christmas-july-socks5-malware-and-exploit-kits</a><br/><a href='https://operation-endgame.com/' target='_blank' rel='noreferrer noopener'>https://operation-endgame.com/</a><br/><a href='https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation</a><br/><a href='https://x.com/Shadowserver/status/1797945864004210843' target='_blank' rel='noreferrer noopener'>https://x.com/Shadowserver/status/1797945864004210843</a><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello, cyber sleuths! In today&apos;s exciting episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by the brilliant Pim Trouerbach, Senior Reverse Engineer at Proofpoint. Pim gives us the lowdown on this massive law enforcement operation targeting multiple high-profile botnets across the globe, called Operation Endgame, and how this coordinated takedown affects the cybercrime landscape and the significance of arresting the individuals behind these operations.<br/><br/>He also breaks down the different malware impacted including SystemBC, IcedID, Pikabot, Bumblebee, and more.<br/><br/>We also talk about: <b><br/></b><br/><ul><li>the rise and fall of Bumblebee, comparing it to its predecessor, Baza Loader, and contemplating why it didn&apos;t quite live up to its anticipated potential despite its advanced features</li><li>the collaborative efforts between law enforcement and private sector partners, emphasizing the effectiveness of these joint operations in curbing cyber threats</li><li>the high-quality, cinematic videos released as part of Operation Endgame</li></ul><b><br/></b>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/major-botnets-disrupted-global-law-enforcement-takedown</a><br/><a href='https://www.proofpoint.com/us/threat-insight/post/systembc-christmas-july-socks5-malware-and-exploit-kits' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/threat-insight/post/systembc-christmas-july-socks5-malware-and-exploit-kits</a><br/><a href='https://operation-endgame.com/' target='_blank' rel='noreferrer noopener'>https://operation-endgame.com/</a><br/><a href='https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation' target='_blank' rel='noreferrer noopener'>https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation</a><br/><a href='https://x.com/Shadowserver/status/1797945864004210843' target='_blank' rel='noreferrer noopener'>https://x.com/Shadowserver/status/1797945864004210843</a><br/><br/>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Subscribe &amp; Follow:<br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491619-checkmate-breaking-down-operation-endgame.mp3" length="33829020" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qkkx9fc0fnpaa8mqkev3r30p9ndl?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60504565</guid>
    <pubDate>Tue, 25 Jun 2024 13:56:09 -0400</pubDate>
    <itunes:duration>2816</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hacking the Human Mind: How Cyber Attackers Exploit Our Brains</itunes:title>
    <title>Hacking the Human Mind: How Cyber Attackers Exploit Our Brains</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our cyber squirrels! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Dr. Bob Hausmann, Proofpoint's Manager of Learning Architecture and Assessments and a seasoned psychologist.  Our conversation explores how cyber threat actors exploit the different systems of thought in our brains and how attackers leverage our rapid, emotionally-driven responses (system one thinking) to bypass our more deli...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber squirrels! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Dr. Bob Hausmann, Proofpoint&apos;s Manager of Learning Architecture and Assessments and a seasoned psychologist.<br/><br/>Our conversation explores how cyber threat actors exploit the different systems of thought in our brains and how attackers leverage our rapid, emotionally-driven responses (system one thinking) to bypass our more deliberate, rational processes (system two thinking).<br/><br/>Dr. Bob introduces us to the concept of cognitive biases, particularly normalcy bias, and how these mental shortcuts can shape our cyber defense strategies. He explains how organizations often fall into the trap of thinking &quot;it won&apos;t happen to us,&quot; leading to underinvestment in critical security measures. Drawing parallels to historical events like the sinking of the Titanic and the COVID-19 pandemic, he underscores the importance of overcoming these biases to enhance preparedness.<br/><br/>We also talk about: <b><br/></b><br/><ul><li>Real-world implications and examples of social engineering attacks.</li><li>The impact of urgency and stress on decision-making in cybersecurity.</li><li>The alarming rise and mechanics of pig butchering scams.</li><li>The role of AI in scams and cybersecurity</li><li>Empathetic approaches to helping scam victims</li></ul><b><br/></b>Resources mentioned:<br/><ul><li>Book: <a href='https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555' target='_blank' rel='noreferrer noopener'>&quot;Thinking, Fast and Slow&quot; by Daniel Kahneman</a></li></ul><br/><br/><br/><ul><li>Book: <a href='https://www.amazon.com/Art-Deception-Controlling-Element-Security/dp/076454280X' target='_blank' rel='noreferrer noopener'>&quot;The Art of Deception&quot; by Kevin Mitnick</a></li></ul><br/><ul><li><a href='https://podcasts.apple.com/us/podcast/confidence-confusion-cashout-how-pig-butchering-is/id1612506550?i=1000593529141' target='_blank' rel='noreferrer noopener'>Previous Discarded Episode on Pig Butchering </a></li></ul><br/><ul><li><a href='https://haveibeenpwned.com/' target='_blank' rel='noreferrer noopener'>Have I Been </a><a href='https://haveibeenpwned.com/' target='_blank' rel='noreferrer noopener'>Pwned</a></li></ul><br/><ul><li><a href='https://cofense.com/' target='_blank' rel='noreferrer noopener'>PhishMe</a></li></ul><br/><ul><li><a href='https://www.cisa.gov/' target='_blank' rel='noreferrer noopener'>Cybersecurity and Infrastructure Security Agency (CISA)</a></li></ul><br/><ul><li><a href='https://www.sans.org/' target='_blank' rel='noreferrer noopener'>SANS Institute</a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a></li></ul><br/><ul><li><a href='https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually' target='_blank' rel='noreferrer noopener'>https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually</a></li></ul><br/><ul><li><a href='https://www.cfr.org/in-brief/how-myanmar-became-global-center-cyber-scams' target='_blank' rel='noreferrer noopener'>https://www.cfr.org/in-brief/how-myanmar-became-global-center-cyber-scams</a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests</a><b><br/><br/><br/></b></li></ul>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'></a>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber squirrels! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Dr. Bob Hausmann, Proofpoint&apos;s Manager of Learning Architecture and Assessments and a seasoned psychologist.<br/><br/>Our conversation explores how cyber threat actors exploit the different systems of thought in our brains and how attackers leverage our rapid, emotionally-driven responses (system one thinking) to bypass our more deliberate, rational processes (system two thinking).<br/><br/>Dr. Bob introduces us to the concept of cognitive biases, particularly normalcy bias, and how these mental shortcuts can shape our cyber defense strategies. He explains how organizations often fall into the trap of thinking &quot;it won&apos;t happen to us,&quot; leading to underinvestment in critical security measures. Drawing parallels to historical events like the sinking of the Titanic and the COVID-19 pandemic, he underscores the importance of overcoming these biases to enhance preparedness.<br/><br/>We also talk about: <b><br/></b><br/><ul><li>Real-world implications and examples of social engineering attacks.</li><li>The impact of urgency and stress on decision-making in cybersecurity.</li><li>The alarming rise and mechanics of pig butchering scams.</li><li>The role of AI in scams and cybersecurity</li><li>Empathetic approaches to helping scam victims</li></ul><b><br/></b>Resources mentioned:<br/><ul><li>Book: <a href='https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555' target='_blank' rel='noreferrer noopener'>&quot;Thinking, Fast and Slow&quot; by Daniel Kahneman</a></li></ul><br/><br/><br/><ul><li>Book: <a href='https://www.amazon.com/Art-Deception-Controlling-Element-Security/dp/076454280X' target='_blank' rel='noreferrer noopener'>&quot;The Art of Deception&quot; by Kevin Mitnick</a></li></ul><br/><ul><li><a href='https://podcasts.apple.com/us/podcast/confidence-confusion-cashout-how-pig-butchering-is/id1612506550?i=1000593529141' target='_blank' rel='noreferrer noopener'>Previous Discarded Episode on Pig Butchering </a></li></ul><br/><ul><li><a href='https://haveibeenpwned.com/' target='_blank' rel='noreferrer noopener'>Have I Been </a><a href='https://haveibeenpwned.com/' target='_blank' rel='noreferrer noopener'>Pwned</a></li></ul><br/><ul><li><a href='https://cofense.com/' target='_blank' rel='noreferrer noopener'>PhishMe</a></li></ul><br/><ul><li><a href='https://www.cisa.gov/' target='_blank' rel='noreferrer noopener'>Cybersecurity and Infrastructure Security Agency (CISA)</a></li></ul><br/><ul><li><a href='https://www.sans.org/' target='_blank' rel='noreferrer noopener'>SANS Institute</a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a></li></ul><br/><ul><li><a href='https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually' target='_blank' rel='noreferrer noopener'>https://therecord.media/southeast-asian-scam-syndicates-stealing-billions-annually</a></li></ul><br/><ul><li><a href='https://www.cfr.org/in-brief/how-myanmar-became-global-center-cyber-scams' target='_blank' rel='noreferrer noopener'>https://www.cfr.org/in-brief/how-myanmar-became-global-center-cyber-scams</a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests</a><b><br/><br/><br/></b></li></ul>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'></a>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491620-hacking-the-human-mind-how-cyber-attackers-exploit-our-brains.mp3" length="37310551" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8sk1kjlbp1pabzdnknskhs6t8gwt?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60342164</guid>
    <pubDate>Tue, 11 Jun 2024 04:00:04 -0400</pubDate>
    <itunes:duration>3106</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Decrypting Cyber Threats: Tactics, Takedowns, and Resilience</itunes:title>
    <title>Decrypting Cyber Threats: Tactics, Takedowns, and Resilience</title>
    <itunes:summary><![CDATA[Send us fan mail! Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint. The conversation dives into the intricate world of cyber threats and the impact of law enforcement disruptions on malware, botnets, and ransomware actors.  We'll explore how threat actors react when their preferred infrastructures or ransomware-as-a-service systems g...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint. The conversation dives into the intricate world of cyber threats and the impact of law enforcement disruptions on malware, botnets, and ransomware actors.<br/><br/>We&apos;ll explore how threat actors react when their preferred infrastructures or ransomware-as-a-service systems get taken down, offering insights into their various responses—from rebuilding and rebranding to the emergence of new power players in the cybercriminal ecosystem.<b><br/><br/>We also talk about: <br/></b><ul><li>Analysis of the Hive ransomware takedown and the massive Qbot operation, including the technical and human aspects of these disruptions</li><li>How other groups rise to prominence despite disruptions</li><li>Differences between malware disruptions and business email compromise (BEC) or fraud-focused disruptions</li><li>The evolution of threat actor techniques, such as, legitimate remote management tools and living off the land techniques</li></ul><b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our special guest–Daniel Blackford, the Director of Threat Research at Proofpoint. The conversation dives into the intricate world of cyber threats and the impact of law enforcement disruptions on malware, botnets, and ransomware actors.<br/><br/>We&apos;ll explore how threat actors react when their preferred infrastructures or ransomware-as-a-service systems get taken down, offering insights into their various responses—from rebuilding and rebranding to the emergence of new power players in the cybercriminal ecosystem.<b><br/><br/>We also talk about: <br/></b><ul><li>Analysis of the Hive ransomware takedown and the massive Qbot operation, including the technical and human aspects of these disruptions</li><li>How other groups rise to prominence despite disruptions</li><li>Differences between malware disruptions and business email compromise (BEC) or fraud-focused disruptions</li><li>The evolution of threat actor techniques, such as, legitimate remote management tools and living off the land techniques</li></ul><b><br/><br/></b>For more information about Proofpoint, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/><b>Subscribe &amp; Follow:</b><br/>Don&apos;t miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491621-decrypting-cyber-threats-tactics-takedowns-and-resilience.mp3" length="31336661" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8z9go405wuv8gm6dkdvx853mx6ln?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/60201178</guid>
    <pubDate>Wed, 29 May 2024 04:00:05 -0400</pubDate>
    <itunes:duration>2609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It Works on My Machine: Why and How Engineering Skills Matter in Threat Research</itunes:title>
    <title>It Works on My Machine: Why and How Engineering Skills Matter in Threat Research</title>
    <itunes:summary><![CDATA[Send us fan mail! The Discarded Podcast team is gearing up and working hard for a new season! Until then we have a special Re-Run treat--one of our favorite episodes! Enjoy!  Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share.   They emphasize the importance of understanding the requirements and context of security research...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>The Discarded Podcast team is gearing up and working hard for a new season! Until then we have a special Re-Run treat--one of our favorite episodes! Enjoy!<br/><br/>Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share. <br/><br/>They emphasize the importance of understanding the requirements and context of security researchers to build effective tools. The conversation touches on the potential impact of AI and LLMs (large language models) in threat research. While AI tools can be valuable for entry-level tasks, the context, experience, and expertise of human engineers are essential for handling complex code and understanding threat actors&apos; behaviors.<br/><br/>Join us as we also discuss:<br/>[02:59] The uniqueness of engineering skills in understanding researchers&apos; requirements for data cleaning, tool development, and working in a security environment.<br/>[11:06] How the versioning in malware samples can provide insights into the threat actors&apos; behavior and trajectory.<br/>[13:24] How malware is simply software with malicious intent, and how practices of developers and threat actors can overlap.<br/>[17:10] The tools and techniques used by threat actors, including obfuscation and encryption methods.[21:42] The importance of context and experience in writing tools and understanding researchers&apos; workflows.<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>The Discarded Podcast team is gearing up and working hard for a new season! Until then we have a special Re-Run treat--one of our favorite episodes! Enjoy!<br/><br/>Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share. <br/><br/>They emphasize the importance of understanding the requirements and context of security researchers to build effective tools. The conversation touches on the potential impact of AI and LLMs (large language models) in threat research. While AI tools can be valuable for entry-level tasks, the context, experience, and expertise of human engineers are essential for handling complex code and understanding threat actors&apos; behaviors.<br/><br/>Join us as we also discuss:<br/>[02:59] The uniqueness of engineering skills in understanding researchers&apos; requirements for data cleaning, tool development, and working in a security environment.<br/>[11:06] How the versioning in malware samples can provide insights into the threat actors&apos; behavior and trajectory.<br/>[13:24] How malware is simply software with malicious intent, and how practices of developers and threat actors can overlap.<br/>[17:10] The tools and techniques used by threat actors, including obfuscation and encryption methods.[21:42] The importance of context and experience in writing tools and understanding researchers&apos; workflows.<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491622-it-works-on-my-machine-why-and-how-engineering-skills-matter-in-threat-research.mp3" length="33810077" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5uddx4fb7anakgky6ahmgz3elefj?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/59906081</guid>
    <pubDate>Wed, 08 May 2024 04:00:05 -0400</pubDate>
    <itunes:duration>2814</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor</itunes:title>
    <title>Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor</title>
    <itunes:summary><![CDATA[Send us fan mail! Today’s focus is on the elusive threat actor known as TA4903. But that's not all - we've got a special treat for you as well. Our longtime producer, Mindy, is joining us as a co-host, bringing her expertise and insights to the table, as we turn the mic around and interview, Selena!   We explore recent research conducted by Selena and her team on TA4903’s distinct objectives. Unlike many cybercrime actors, TA4903 demonstrates a unique combination of tactics, targeting bo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Today’s focus is on the elusive threat actor known as TA4903. But that&apos;s not all - we&apos;ve got a special treat for you as well. Our longtime producer, Mindy, is joining us as a co-host, bringing her expertise and insights to the table, as we turn the mic around and interview, Selena! <br/><br/>We explore recent research conducted by Selena and her team on TA4903’s distinct objectives. Unlike many cybercrime actors, TA4903 demonstrates a unique combination of tactics, targeting both high-volume credential phishing campaigns and lower-volume direct business email compromises.<br/><br/>We also dive into:<br/><ul><li>TA4903 spoofs government entities like the Department of Transportation and the Department of Labor to lure victims</li><li>Use of advanced techniques including evil proxy for multi-factor authentication token theft and QR codes for phishing campaigns</li><li>Rising trends in cryptocurrency-related scams and other financial frauds</li></ul><b><br/>Resources mentioned:<br/></b><a href='https://www.proofpoint.com/us/blog/threat-insight/mfa-psa-oh-my' target='_blank' rel='noreferrer noopener'>MFA Bypass</a> (Blog) by Timothy Kromphardt<br/><br/><a href='https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf' target='_blank' rel='noreferrer noopener'>IC3 2023 FBI Report </a><br/><br/>New TA4903 research: <a href='https://www.proofpoint.com/us/blog/threat-insight/ta4903-actor-spoofs-us-government-small-businesses-phishing-bec-bids' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta4903-actor-spoofs-us-government-small-businesses-phishing-bec-bids</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Today’s focus is on the elusive threat actor known as TA4903. But that&apos;s not all - we&apos;ve got a special treat for you as well. Our longtime producer, Mindy, is joining us as a co-host, bringing her expertise and insights to the table, as we turn the mic around and interview, Selena! <br/><br/>We explore recent research conducted by Selena and her team on TA4903’s distinct objectives. Unlike many cybercrime actors, TA4903 demonstrates a unique combination of tactics, targeting both high-volume credential phishing campaigns and lower-volume direct business email compromises.<br/><br/>We also dive into:<br/><ul><li>TA4903 spoofs government entities like the Department of Transportation and the Department of Labor to lure victims</li><li>Use of advanced techniques including evil proxy for multi-factor authentication token theft and QR codes for phishing campaigns</li><li>Rising trends in cryptocurrency-related scams and other financial frauds</li></ul><b><br/>Resources mentioned:<br/></b><a href='https://www.proofpoint.com/us/blog/threat-insight/mfa-psa-oh-my' target='_blank' rel='noreferrer noopener'>MFA Bypass</a> (Blog) by Timothy Kromphardt<br/><br/><a href='https://www.ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf' target='_blank' rel='noreferrer noopener'>IC3 2023 FBI Report </a><br/><br/>New TA4903 research: <a href='https://www.proofpoint.com/us/blog/threat-insight/ta4903-actor-spoofs-us-government-small-businesses-phishing-bec-bids' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta4903-actor-spoofs-us-government-small-businesses-phishing-bec-bids</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491623-decoding-ta4903-exploring-the-dual-objectives-of-a-unique-cyber-threat-actor.mp3" length="29505500" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mo5pdw6vl47ja1iugq4o60w6jlmu?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/59262926</guid>
    <pubDate>Tue, 02 Apr 2024 11:42:21 -0400</pubDate>
    <itunes:duration>2456</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Trip Down Malware Lane: How Today&#39;s Hottest Malware Stacks Up Against Predecessors</itunes:title>
    <title>A Trip Down Malware Lane: How Today&#39;s Hottest Malware Stacks Up Against Predecessors</title>
    <itunes:summary><![CDATA[Send us fan mail! It has been a busy first quarter for the Proofpoint Threat Research team! Today we have returning guest, Pim Trouerbach, to share his personal stories about his favorite malware and discuss the current landscape, including insights on Pikabot, Latrodectus, and WikiLoader.   The conversation explores the evolution from old school banking trojans to the current favored payloads from major cybercrime actors, and the changes in malware development through the years. Pim sha...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><b>I</b>t has been a busy first quarter for the Proofpoint Threat Research team! Today we have returning guest, Pim Trouerbach, to share his personal stories about his favorite malware and discuss the current landscape, including insights on Pikabot, Latrodectus, and WikiLoader. <br/><br/>The conversation explores the evolution from old school banking trojans to the current favored payloads from major cybercrime actors, and the changes in malware development through the years. Pim shares the different meticulous analysis and research efforts, and we learn about mechanisms to combat the malware.  <br/><br/>We also dive into:<br/><ul><li>a valuable lesson about the consequences of malware running rampant in a sandbox environment</li><li>the shifts in attack chains and tactics employed by threat actors</li><li>the need for adaptive detection methods to combat evolving cyber threats</li></ul><b><br/><br/></b>Resources mentioned:<br/><a href='https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196' target='_blank' rel='noreferrer noopener'>Countdown to Zero Day</a> by Kim Zetter<br/><br/>Shareable Links:<br/>https://www.proofpoint.com/us/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion <br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-tis-season-tax-hax' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-tis-season-tax-hax</a> <br/><br/>Pim’s Favorite Malware: <br/><br/>* Emotet: https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-280a <br/><br/>* IcedID: https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid  <br/><br/>* Dridex: https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-339a <br/><br/>* Hancitor: https://malpedia.caad.fkie.fraunhofer.de/details/win.hancitor <br/><br/>* Qbot: https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot <br/><br/>* Hikit (APT): https://attack.mitre.org/software/S0009/ <br/><br/>* Stuxnet (APT): https://www.penguinrandomhouse.com/books/219931/countdown-to-zero-day-by-kim-zetter/ <br/><br/>* Cutwail: <a href='https://malpedia.caad.fkie.fraunhofer.de/details/win.cutwail' target='_blank' rel='noreferrer noopener'>https://malpedia.caad.fkie.fraunhofer.de/details/win.cutwail</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><b>I</b>t has been a busy first quarter for the Proofpoint Threat Research team! Today we have returning guest, Pim Trouerbach, to share his personal stories about his favorite malware and discuss the current landscape, including insights on Pikabot, Latrodectus, and WikiLoader. <br/><br/>The conversation explores the evolution from old school banking trojans to the current favored payloads from major cybercrime actors, and the changes in malware development through the years. Pim shares the different meticulous analysis and research efforts, and we learn about mechanisms to combat the malware.  <br/><br/>We also dive into:<br/><ul><li>a valuable lesson about the consequences of malware running rampant in a sandbox environment</li><li>the shifts in attack chains and tactics employed by threat actors</li><li>the need for adaptive detection methods to combat evolving cyber threats</li></ul><b><br/><br/></b>Resources mentioned:<br/><a href='https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196' target='_blank' rel='noreferrer noopener'>Countdown to Zero Day</a> by Kim Zetter<br/><br/>Shareable Links:<br/>https://www.proofpoint.com/us/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion <br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta577s-unusual-attack-chain-leads-ntlm-data-theft</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black</a><br/><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/security-brief-tis-season-tax-hax' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/security-brief-tis-season-tax-hax</a> <br/><br/>Pim’s Favorite Malware: <br/><br/>* Emotet: https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-280a <br/><br/>* IcedID: https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid  <br/><br/>* Dridex: https://www.cisa.gov/news-events/cybersecurity-advisories/aa19-339a <br/><br/>* Hancitor: https://malpedia.caad.fkie.fraunhofer.de/details/win.hancitor <br/><br/>* Qbot: https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot <br/><br/>* Hikit (APT): https://attack.mitre.org/software/S0009/ <br/><br/>* Stuxnet (APT): https://www.penguinrandomhouse.com/books/219931/countdown-to-zero-day-by-kim-zetter/ <br/><br/>* Cutwail: <a href='https://malpedia.caad.fkie.fraunhofer.de/details/win.cutwail' target='_blank' rel='noreferrer noopener'>https://malpedia.caad.fkie.fraunhofer.de/details/win.cutwail</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491624-a-trip-down-malware-lane-how-today-s-hottest-malware-stacks-up-against-predecessors.mp3" length="40626610" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jf2b1t5pjn9rsbbdpqikbvfleb8y?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/59095163</guid>
    <pubDate>Tue, 19 Mar 2024 04:00:02 -0400</pubDate>
    <itunes:duration>3381</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hiding In Plain Sight: Unique Methods Of C2 From Infostealers</itunes:title>
    <title>Hiding In Plain Sight: Unique Methods Of C2 From Infostealers</title>
    <itunes:summary><![CDATA[Send us fan mail! Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities.  Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities.<br/><br/>Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and control. He emphasizes the team&apos;s engagement with the InfoSec community, highlighting the value of platforms like Twitter and Mastodon for sharing and receiving information.<br/><br/>We also dive into:<br/><ul><li>the unique challenges of crafting effective signatures</li><li>the specifics of malware, focusing on Vidar stealer and highlighting the dynamic nature of Vidar&apos;s command and control infrastructure</li><li>the distribution methods of these malware strains, from email campaigns to unconventional tactics like using video game platforms and social media for luring victims</li></ul><b><br/></b>Resources mentioned:<br/><br/><a href='https://www.youtube.com/watch?v=0mJayM2X6Wo' target='_blank' rel='noreferrer noopener'>Intro to Traffic Analysis</a> w/ Issac Shaughnessy<br/>Emerging Threats Mastodon: <a href='https://infosec.exchange/@emergingthreats' target='_blank' rel='noreferrer noopener'>https://infosec.exchange/@emergingthreats</a><br/>Threat Insight Mastodon: <a href='https://infosec.exchange/@threatinsight' target='_blank' rel='noreferrer noopener'>https://infosec.exchange/@threatinsight</a><br/><a href='https://community.emergingthreats.net/t/vidar-stealer-picks-up-steam/271' target='_blank' rel='noreferrer noopener'>Vidar Stealer Picks Up Steam!</a><b><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play a crucial role in identifying and mitigating cyber threats by scrutinizing and analyzing network traffic for malicious patterns and activities.<br/><br/>Today’s guest is Isaac Shaughnessy, a Threat Detection Engineer at Proofpoint. Isaac shares his insights into the challenges of detecting and mitigating malware, especially those using social platforms for command and control. He emphasizes the team&apos;s engagement with the InfoSec community, highlighting the value of platforms like Twitter and Mastodon for sharing and receiving information.<br/><br/>We also dive into:<br/><ul><li>the unique challenges of crafting effective signatures</li><li>the specifics of malware, focusing on Vidar stealer and highlighting the dynamic nature of Vidar&apos;s command and control infrastructure</li><li>the distribution methods of these malware strains, from email campaigns to unconventional tactics like using video game platforms and social media for luring victims</li></ul><b><br/></b>Resources mentioned:<br/><br/><a href='https://www.youtube.com/watch?v=0mJayM2X6Wo' target='_blank' rel='noreferrer noopener'>Intro to Traffic Analysis</a> w/ Issac Shaughnessy<br/>Emerging Threats Mastodon: <a href='https://infosec.exchange/@emergingthreats' target='_blank' rel='noreferrer noopener'>https://infosec.exchange/@emergingthreats</a><br/>Threat Insight Mastodon: <a href='https://infosec.exchange/@threatinsight' target='_blank' rel='noreferrer noopener'>https://infosec.exchange/@threatinsight</a><br/><a href='https://community.emergingthreats.net/t/vidar-stealer-picks-up-steam/271' target='_blank' rel='noreferrer noopener'>Vidar Stealer Picks Up Steam!</a><b><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491625-hiding-in-plain-sight-unique-methods-of-c2-from-infostealers.mp3" length="19743921" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zv38eyc3yfgqjaex3kusn7zo40xx?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58927211</guid>
    <pubDate>Tue, 05 Mar 2024 04:00:02 -0500</pubDate>
    <itunes:duration>1642</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions</itunes:title>
    <title>From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions</title>
    <itunes:summary><![CDATA[Send us fan mail! The esteemed Katie Nickels joins us on the show today! Katie is the Director of Intelligence Operations at Red Canary, and our conversation with her explores a wide array of topics, ranging from career growth in threat intelligence to the intricacies of attribution and threat actor naming.  Katie delves into her diverse career journey and transitions to advice for those entering the field, emphasizing persistence, creativity, and considering entry-level roles like SOC analys...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>The esteemed Katie Nickels joins us on the show today! Katie is the Director of Intelligence Operations at Red Canary, and our conversation with her explores a wide array of topics, ranging from career growth in threat intelligence to the intricacies of attribution and threat actor naming.<br/><br/>Katie delves into her diverse career journey and transitions to advice for those entering the field, emphasizing persistence, creativity, and considering entry-level roles like SOC analyst positions. There is also talk of avoiding burnout while pursuing one’s passion, especially in cybersecurity.<br/><br/>We also dive into:<br/><ul><li>Communication and attribution challenges including the confusion of different naming conventions</li><li>Marketing and the personification of threat actors</li><li>Strategic approaches in handling incidents and avoiding panic</li></ul><b><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>The esteemed Katie Nickels joins us on the show today! Katie is the Director of Intelligence Operations at Red Canary, and our conversation with her explores a wide array of topics, ranging from career growth in threat intelligence to the intricacies of attribution and threat actor naming.<br/><br/>Katie delves into her diverse career journey and transitions to advice for those entering the field, emphasizing persistence, creativity, and considering entry-level roles like SOC analyst positions. There is also talk of avoiding burnout while pursuing one’s passion, especially in cybersecurity.<br/><br/>We also dive into:<br/><ul><li>Communication and attribution challenges including the confusion of different naming conventions</li><li>Marketing and the personification of threat actors</li><li>Strategic approaches in handling incidents and avoiding panic</li></ul><b><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.</b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491626-from-attribution-to-advancement-red-canary-s-katie-nickels-tackles-cti-s-biggest-questions.mp3" length="33913843" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2oczftfjrlttsdsszf2mivumiae5?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58747089</guid>
    <pubDate>Tue, 20 Feb 2024 04:00:02 -0500</pubDate>
    <itunes:duration>2823</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone</itunes:title>
    <title>Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone</title>
    <itunes:summary><![CDATA[Send us fan mail! *This episode contains content warnings of suicide and self-harm*   “It’s not about preventing something from happening, it’s being prepared for when it does.” This episode is filled with stories from the different scenarios that have been plaguing people with cyber security attacks.   Today’s guest is Kevin Collier, a cybersecurity reporter at NBC. He joins us to discuss his experiences covering cybersecurity stories for a mainstream audience. As the first and only dedicate...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><i>*This episode contains content warnings of suicide and self-harm* </i><br/><br/>“It’s not about preventing something from happening, it’s being prepared for when it does.” This episode is filled with stories from the different scenarios that have been plaguing people with cyber security attacks. <br/><br/>Today’s guest is Kevin Collier, a cybersecurity reporter at NBC. He joins us to discuss his experiences covering cybersecurity stories for a mainstream audience. As the first and only dedicated cybersecurity reporter at NBC, Collier reflects on the evolving nature of media coverage in the cybersecurity space, emphasizing the increasing need for dedicated coverage in major news publications. He highlights the rise of scams facilitated through text messages, emails, and zero-day exploits, emphasizing the geopolitical circumstances that enable these threats, and also helping audiences understand the reality behind the cyber threats they face.<br/><br/>They also dive into:<ul><li>The poignant reporting process on a story of pig butchering scams</li><li>The normalization of cyber threats, such as ransomware, and the role of the media in shaping public perception</li><li>The process of convincing stakeholders to prioritize certain topics</li><li>The emotional toll of reporting on sensitive cybersecurity topics and the importance of self-care in navigating this challenging intersection.</li></ul><br/><br/>Resources mentioned:  <i>trigger warning for content of suicide and self-harm</i><br/><br/><a href='https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252' target='_blank' rel='noreferrer noopener'>“Online romance scams are netting millions of dollars — and pushing some to self-harm” </a>by Kevin Collier<br/><br/><a href='https://podcasts.apple.com/us/podcast/obfuscated-online-threats-and-the-visually-impaired/id1612506550?i=1000630148789' target='_blank' rel='noreferrer noopener'>Discarded Episode with Tim</a> Utzig<br/><br/><a href='https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years' target='_blank' rel='noreferrer noopener'>Colonial Pipeline Blog</a> by CISA.gov<br/><br/><br/><br/><br/><br/><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><i>*This episode contains content warnings of suicide and self-harm* </i><br/><br/>“It’s not about preventing something from happening, it’s being prepared for when it does.” This episode is filled with stories from the different scenarios that have been plaguing people with cyber security attacks. <br/><br/>Today’s guest is Kevin Collier, a cybersecurity reporter at NBC. He joins us to discuss his experiences covering cybersecurity stories for a mainstream audience. As the first and only dedicated cybersecurity reporter at NBC, Collier reflects on the evolving nature of media coverage in the cybersecurity space, emphasizing the increasing need for dedicated coverage in major news publications. He highlights the rise of scams facilitated through text messages, emails, and zero-day exploits, emphasizing the geopolitical circumstances that enable these threats, and also helping audiences understand the reality behind the cyber threats they face.<br/><br/>They also dive into:<ul><li>The poignant reporting process on a story of pig butchering scams</li><li>The normalization of cyber threats, such as ransomware, and the role of the media in shaping public perception</li><li>The process of convincing stakeholders to prioritize certain topics</li><li>The emotional toll of reporting on sensitive cybersecurity topics and the importance of self-care in navigating this challenging intersection.</li></ul><br/><br/>Resources mentioned:  <i>trigger warning for content of suicide and self-harm</i><br/><br/><a href='https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252' target='_blank' rel='noreferrer noopener'>“Online romance scams are netting millions of dollars — and pushing some to self-harm” </a>by Kevin Collier<br/><br/><a href='https://podcasts.apple.com/us/podcast/obfuscated-online-threats-and-the-visually-impaired/id1612506550?i=1000630148789' target='_blank' rel='noreferrer noopener'>Discarded Episode with Tim</a> Utzig<br/><br/><a href='https://www.cisa.gov/news-events/news/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years' target='_blank' rel='noreferrer noopener'>Colonial Pipeline Blog</a> by CISA.gov<br/><br/><br/><br/><br/><br/><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491627-beyond-the-headlines-reporting-on-sensitive-cybersecurity-topics-to-resonate-with-everyone.mp3" length="40094346" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dc88wdo1jr839liu7qaaj1lge77t?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58577992</guid>
    <pubDate>Tue, 06 Feb 2024 04:00:02 -0500</pubDate>
    <itunes:duration>3338</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024</itunes:title>
    <title>Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024</title>
    <itunes:summary><![CDATA[Send us fan mail! Is 2024 the year of adaptability and collaboration within the security community? Let’s hope so!  Today’s episode is Part Two of what to expect in cybersecurity in 2024, and our guests are Randy Pargman and Rich Gonzalez. Randy sheds light on the crucial role of the Detections Team and emphasizes the constant innovation of malware authors, and the team’s mission to outsmart them. Rich discusses the Emerging Threats team and dives into open source and paid resources as force ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Is 2024 the year of adaptability and collaboration within the security community? Let’s hope so!<br/><br/>Today’s episode is Part Two of what to expect in cybersecurity in 2024, and our guests are Randy Pargman and Rich Gonzalez. Randy sheds light on the crucial role of the Detections Team and emphasizes the constant innovation of malware authors, and the team’s mission to outsmart them. Rich discusses the Emerging Threats team and dives into open source and paid resources as force multipliers for security teams.<br/><br/>While some reflections were shared about 2023, namely multiple high-profile vulnerability events and the challenges posed by QR codes, the conversation focused on the upcoming year. They anticipate increased creativity from threat actors, and emphasize the constant battle between red and blue teams. The conversation underscores the need for constant adaptation, response to emerging threats, and collaboration within the security community.<br/><br/>Other topics discussed include:<ul><li>Incidents like WinRAR, Citrix NetScaler ADC, and ScreenConnect vulnerabilities</li><li>The positive impact of public-private partnerships and international cooperation in enhancing cybersecurity defenses</li><li>Hopeful vision for the industry, advocating for understanding, education, &amp; increased diversity</li></ul><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Is 2024 the year of adaptability and collaboration within the security community? Let’s hope so!<br/><br/>Today’s episode is Part Two of what to expect in cybersecurity in 2024, and our guests are Randy Pargman and Rich Gonzalez. Randy sheds light on the crucial role of the Detections Team and emphasizes the constant innovation of malware authors, and the team’s mission to outsmart them. Rich discusses the Emerging Threats team and dives into open source and paid resources as force multipliers for security teams.<br/><br/>While some reflections were shared about 2023, namely multiple high-profile vulnerability events and the challenges posed by QR codes, the conversation focused on the upcoming year. They anticipate increased creativity from threat actors, and emphasize the constant battle between red and blue teams. The conversation underscores the need for constant adaptation, response to emerging threats, and collaboration within the security community.<br/><br/>Other topics discussed include:<ul><li>Incidents like WinRAR, Citrix NetScaler ADC, and ScreenConnect vulnerabilities</li><li>The positive impact of public-private partnerships and international cooperation in enhancing cybersecurity defenses</li><li>Hopeful vision for the industry, advocating for understanding, education, &amp; increased diversity</li></ul><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491628-strategies-for-defense-and-disruption-part-two-of-predicting-cyber-threats-in-2024.mp3" length="47741500" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qtajy2zal780b2tbqclxmoaawlbv?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58408947</guid>
    <pubDate>Tue, 23 Jan 2024 04:00:02 -0500</pubDate>
    <itunes:duration>3976</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024</itunes:title>
    <title>Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024</title>
    <itunes:summary><![CDATA[Send us fan mail! To move forward, it’s good to take a minute and reflect on what’s happened.   Today’s episode focuses on insights from Daniel Blackford and Alexis Dorais-Joncas, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.  Reflecting on 2023, they discuss the use of QR codes, major technique shifts from the biggest ecrime and APT actors, and the ongoing problem of ransomware.  Looking ahead to 202...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>To move forward, it’s good to take a minute and reflect on what’s happened. <br/><br/>Today’s episode focuses on insights from Daniel Blackford and <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Alexis Dorais-Joncas</a>, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.<br/><br/>Reflecting on 2023, they discuss the use of QR codes, major technique shifts from the biggest ecrime and APT actors, and the ongoing problem of ransomware.<br/><br/>Looking ahead to 2024, the emphasis goes to the gradual shift of attacks outside corporate-managed infrastructure, leveraging personal email accounts to bypass extensive security measures. On the cybercrime side, there’s a prediction of the continued development of as-a-service models, particularly focusing on traffic distribution services, leading to more modular and challenging-to-attribute attack chains.<br/><br/>They also dive into:<ul><li>Threat actor activity during the elections and Olympics</li><li>Specific threat actor groups that caught their attention in 2023, TA473 and TA577</li><li>Living off the Land concepts</li></ul>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>To move forward, it’s good to take a minute and reflect on what’s happened. <br/><br/>Today’s episode focuses on insights from Daniel Blackford and <a href='https://proofpoint.com' target='_blank' rel='noreferrer noopener'>Alexis Dorais-Joncas</a>, both Senior Managers of Threat Research at Proofpoint. This is the first in our two-part series looking at what’s on the horizon for 2024.<br/><br/>Reflecting on 2023, they discuss the use of QR codes, major technique shifts from the biggest ecrime and APT actors, and the ongoing problem of ransomware.<br/><br/>Looking ahead to 2024, the emphasis goes to the gradual shift of attacks outside corporate-managed infrastructure, leveraging personal email accounts to bypass extensive security measures. On the cybercrime side, there’s a prediction of the continued development of as-a-service models, particularly focusing on traffic distribution services, leading to more modular and challenging-to-attribute attack chains.<br/><br/>They also dive into:<ul><li>Threat actor activity during the elections and Olympics</li><li>Specific threat actor groups that caught their attention in 2023, TA473 and TA577</li><li>Living off the Land concepts</li></ul>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491629-phishing-elections-and-costly-attacks-part-one-of-predicting-cyber-threats-in-2024.mp3" length="32432367" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p8nr7wuhe1a5vynxis0kvzzb8sd4?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58227436</guid>
    <pubDate>Tue, 09 Jan 2024 04:00:03 -0500</pubDate>
    <itunes:duration>2699</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit</itunes:title>
    <title>Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit</title>
    <itunes:summary><![CDATA[Send us fan mail! In this special Holiday edition of Discarded, the tables are turned with hosts, Selena and Crista, becoming the answer-ers, our returning Moderator, Mindy Semling, as the question asker, and our wonderful audience is transformed into Cyber Elves.   This conversation is lively and filled with questions from a variety of engaged audience members. (Thank you to everyone who contributed). Questions range from career advice for aspiring Cyber Threat Analysts, to certain threats e...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this special Holiday edition of Discarded, the tables are turned with hosts, Selena and Crista, becoming the answer-ers, our returning Moderator, Mindy Semling, as the question asker, and our wonderful audience is transformed into Cyber Elves. <br/><br/>This conversation is lively and filled with questions from a variety of engaged audience members. (Thank you to everyone who contributed). Questions range from career advice for aspiring Cyber Threat Analysts, to certain threats exploding in popularity, to a reflection of 2023. <br/><br/>The Discarded Podcast team would like to take a moment and thank the following people for their contributions to the Cyber Security Landscape this year:<ul><li>Pim Trouerbach</li><li>Kelsey Merriman</li><li>Tommy Madjar</li><li>Bryan Campbell</li><li>Greg Lesnewich</li><li>Kyle Eaton</li><li>Joe Wise</li><li>Emerging Threats team</li><li>The overall Proofpoint Team, including, but not limited to our PR and marketing teams</li></ul><b><br/><br/><br/></b>Resources mentioned:<br/><br/>Youtube: <a href='https://www.youtube.com/watch?v=xsqVWMTRf6g' target='_blank' rel='noreferrer noopener'>Katie Nickels</a> Sans Threat Analysis Rundown<br/><br/><a href='https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/' target='_blank' rel='noreferrer noopener'>https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/</a><br/><br/><a href='https://www.networkdefense.co/courses/investigationtheory/' target='_blank' rel='noreferrer noopener'>https://www.networkdefense.co/courses/investigationtheory/</a><br/><br/><a href='https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252' target='_blank' rel='noreferrer noopener'>https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252</a><br/><br/><a href='https://medium.com/mitre-attack/attack-v14-fa473603f86b' target='_blank' rel='noreferrer noopener'>https://medium.com/mitre-attack/attack-v14-fa473603f86b</a><br/><br/><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a</a><br/><br/><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36</a><br/><br/><a href='https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/' target='_blank' rel='noreferrer noopener'>https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/</a><br/><br/><a href='https://www.wired.com/story/gadget-lab-podcast-621/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/gadget-lab-podcast-621/</a><br/><br/><a href='https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this special Holiday edition of Discarded, the tables are turned with hosts, Selena and Crista, becoming the answer-ers, our returning Moderator, Mindy Semling, as the question asker, and our wonderful audience is transformed into Cyber Elves. <br/><br/>This conversation is lively and filled with questions from a variety of engaged audience members. (Thank you to everyone who contributed). Questions range from career advice for aspiring Cyber Threat Analysts, to certain threats exploding in popularity, to a reflection of 2023. <br/><br/>The Discarded Podcast team would like to take a moment and thank the following people for their contributions to the Cyber Security Landscape this year:<ul><li>Pim Trouerbach</li><li>Kelsey Merriman</li><li>Tommy Madjar</li><li>Bryan Campbell</li><li>Greg Lesnewich</li><li>Kyle Eaton</li><li>Joe Wise</li><li>Emerging Threats team</li><li>The overall Proofpoint Team, including, but not limited to our PR and marketing teams</li></ul><b><br/><br/><br/></b>Resources mentioned:<br/><br/>Youtube: <a href='https://www.youtube.com/watch?v=xsqVWMTRf6g' target='_blank' rel='noreferrer noopener'>Katie Nickels</a> Sans Threat Analysis Rundown<br/><br/><a href='https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/' target='_blank' rel='noreferrer noopener'>https://www.sans.org/cyber-security-courses/cyber-threat-intelligence/</a><br/><br/><a href='https://www.networkdefense.co/courses/investigationtheory/' target='_blank' rel='noreferrer noopener'>https://www.networkdefense.co/courses/investigationtheory/</a><br/><br/><a href='https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252' target='_blank' rel='noreferrer noopener'>https://www.nbcnews.com/tech/tech-news/how-online-romance-scams-netting-millions-self-harm-rcna85252</a><br/><br/><a href='https://medium.com/mitre-attack/attack-v14-fa473603f86b' target='_blank' rel='noreferrer noopener'>https://medium.com/mitre-attack/attack-v14-fa473603f86b</a><br/><br/><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a</a><br/><br/><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36</a><br/><br/><a href='https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/' target='_blank' rel='noreferrer noopener'>https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/</a><br/><br/><a href='https://www.wired.com/story/gadget-lab-podcast-621/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/gadget-lab-podcast-621/</a><br/><br/><a href='https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/mirai-untold-story-three-young-hackers-web-killing-monster/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491630-jingle-bells-phishing-tales-reflecting-on-cybersecurity-in-the-holiday-spirit.mp3" length="46818416" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/c8lvwo6nzjklq4k9l215ivek2ll5?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/58097386</guid>
    <pubDate>Tue, 26 Dec 2023 04:00:02 -0500</pubDate>
    <itunes:duration>3898</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits</itunes:title>
    <title>I Know This Might Sound Crazy but Russia’s TA422 Blasted Lots of Exploits</title>
    <itunes:summary><![CDATA[Send us fan mail! Tis the season for understanding TA422’s latest activity AND for singing podcast guests!  Today’s returning guest is Greg Lesnewich, Senior Threat Researcher at Proofpoint. He sheds light on the tactics, techniques, and procedures (TTPs) employed by TA422. The conversation touches on the significance of the high volumes observed starting in late summer, the exploitation of vulnerabilities for NTLM credential harvesting, and the brief usage of the WinRAR vulnerability.  They ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Tis the season for understanding TA422’s latest activity AND for singing podcast guests!<br/><br/>Today’s returning guest is Greg Lesnewich, Senior Threat Researcher at Proofpoint. He sheds light on the tactics, techniques, and procedures (TTPs) employed by TA422. The conversation touches on the significance of the high volumes observed starting in late summer, the exploitation of vulnerabilities for NTLM credential harvesting, and the brief usage of the WinRAR vulnerability.<br/><br/>They touch upon the potential reasons behind the group&apos;s choices, considering factors such as resourcing, tactical decisions, and a shift towards speed and efficiency. There is also consideration about connecting TA422&apos;s activities to broader trends in threat actor behavior, such as a shift towards living off the land techniques and a focus on social engineering for initial access.<br/><br/>The conversation continues on the following topics:<br/><br/>[11:17] TA422 Recent Activity<br/>[13:30] Campaign’s using CVE 2023 23397<br/>[18:35] Winrar activity<br/>[22:50] October &amp; November activity<br/>[26:50] Guest Singing Spotlight<br/>[29:30] Noticeable differences in campaigns<br/><br/>Resources mentioned:<br/>TA422 Proofpoint Blog: <a href='https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week</a><br/><br/>Google TAG Report on WinRAR Exploits: <a href='https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/amp/' target='_blank' rel='noreferrer noopener'>https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/amp/</a><br/><br/>Selena’s Cyber Tunes Playlist: <a href='https://open.spotify.com/playlist/7GqH7SefgiI1UtYNjQ5svg?si=vO2Ao-lTTSuCCVfgfgcUfw&amp;pt=97da5ebbd320a4f79014b1f205fc8438&amp;pi=u--xbfwSuHSE-T' target='_blank' rel='noreferrer noopener'>https://open.spotify.com/playlist/7GqH7SefgiI1UtYNjQ5svg?si=vO2Ao-lTTSuCCVfgfgcUfw&amp;pt=97da5ebbd320a4f79014b1f205fc8438&amp;pi=u--xbfwSuHSE-T</a><br/><br/>Wired story on Sandworm: <a href='https://www.wired.com/story/sandworm-ukraine-third-blackout-cyberattack/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/sandworm-ukraine-third-blackout-cyberattack/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Tis the season for understanding TA422’s latest activity AND for singing podcast guests!<br/><br/>Today’s returning guest is Greg Lesnewich, Senior Threat Researcher at Proofpoint. He sheds light on the tactics, techniques, and procedures (TTPs) employed by TA422. The conversation touches on the significance of the high volumes observed starting in late summer, the exploitation of vulnerabilities for NTLM credential harvesting, and the brief usage of the WinRAR vulnerability.<br/><br/>They touch upon the potential reasons behind the group&apos;s choices, considering factors such as resourcing, tactical decisions, and a shift towards speed and efficiency. There is also consideration about connecting TA422&apos;s activities to broader trends in threat actor behavior, such as a shift towards living off the land techniques and a focus on social engineering for initial access.<br/><br/>The conversation continues on the following topics:<br/><br/>[11:17] TA422 Recent Activity<br/>[13:30] Campaign’s using CVE 2023 23397<br/>[18:35] Winrar activity<br/>[22:50] October &amp; November activity<br/>[26:50] Guest Singing Spotlight<br/>[29:30] Noticeable differences in campaigns<br/><br/>Resources mentioned:<br/>TA422 Proofpoint Blog: <a href='https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta422s-dedicated-exploitation-loop-same-week-after-week</a><br/><br/>Google TAG Report on WinRAR Exploits: <a href='https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/amp/' target='_blank' rel='noreferrer noopener'>https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/amp/</a><br/><br/>Selena’s Cyber Tunes Playlist: <a href='https://open.spotify.com/playlist/7GqH7SefgiI1UtYNjQ5svg?si=vO2Ao-lTTSuCCVfgfgcUfw&amp;pt=97da5ebbd320a4f79014b1f205fc8438&amp;pi=u--xbfwSuHSE-T' target='_blank' rel='noreferrer noopener'>https://open.spotify.com/playlist/7GqH7SefgiI1UtYNjQ5svg?si=vO2Ao-lTTSuCCVfgfgcUfw&amp;pt=97da5ebbd320a4f79014b1f205fc8438&amp;pi=u--xbfwSuHSE-T</a><br/><br/>Wired story on Sandworm: <a href='https://www.wired.com/story/sandworm-ukraine-third-blackout-cyberattack/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/sandworm-ukraine-third-blackout-cyberattack/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491631-i-know-this-might-sound-crazy-but-russia-s-ta422-blasted-lots-of-exploits.mp3" length="36484481" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/axubormst0vmahae2bhnfwsskr9b?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57954848</guid>
    <pubDate>Tue, 12 Dec 2023 04:00:03 -0500</pubDate>
    <itunes:duration>3038</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MITRE ATT&amp;CK Evolves with Cyber Threat Sophistication</itunes:title>
    <title>MITRE ATT&amp;CK Evolves with Cyber Threat Sophistication</title>
    <itunes:summary><![CDATA[Send us fan mail! Take a deep dive with us into the incomparable MITRE ATT&amp;CK Framework, a comprehensive knowledge base that catalogs real-world threat actor behaviors derived from threat intelligence.   Today’s guests are our great friends at MITRE ATT&amp;CK, Adam Pennington (Attack Lead), and Patrick Howell O’Neill, (Lead Cyber Operations Analyst). They explore how the Framework serves as a common language for communicating adversary threat behaviors and discuss its evolution from an i...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Take a deep dive with us into the incomparable MITRE ATT&amp;CK Framework, a comprehensive knowledge base that catalogs real-world threat actor behaviors derived from threat intelligence. <br/><br/>Today’s guests are our great friends at MITRE ATT&amp;CK, Adam Pennington (Attack Lead), and Patrick Howell O’Neill, (Lead Cyber Operations Analyst). They explore how the Framework serves as a common language for communicating adversary threat behaviors and discuss its evolution from an internal project to a community-driven resource.<br/><br/>The latest version of the MITRE ATT&amp;CK Framework version 14 was released on Halloween, emphasizing new features like the addition of new defensive information and techniques they previously said no to including. They discuss the decision-making process behind incorporating new techniques, such as Financial Theft, Impersonation, Phishing: Spearphishing Voice, and Phishing for Information: Spearphishing Voice.<br/><br/>The conversation continues on the following topics:<br/>[5:00] MITRE ATT&amp;CK Framework<br/>[9:25] Improving cybersecurity detection<br/>[13:00] New ATT&amp;CK techniques<br/>[16:00] Decisions about which techniques to add<br/>[23:00] Mobile ATT&amp;CK<br/>[30:00] Decisions about which trends to include<br/>[37:00] Feedback about the Framework<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/threat-reference/mitre-attack-framework' target='_blank' rel='noreferrer noopener'>What is the MITRE ATT&amp;CK Framework?</a><br/><a href='https://attack.mitre.org/' target='_blank' rel='noreferrer noopener'>https://attack.mitre.org/ </a><br/><a href='https://medium.com/mitre-attack/attack-v14-fa473603f86b' target='_blank' rel='noreferrer noopener'>https://medium.com/mitre-attack/attack-v14-fa473603f86b</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Take a deep dive with us into the incomparable MITRE ATT&amp;CK Framework, a comprehensive knowledge base that catalogs real-world threat actor behaviors derived from threat intelligence. <br/><br/>Today’s guests are our great friends at MITRE ATT&amp;CK, Adam Pennington (Attack Lead), and Patrick Howell O’Neill, (Lead Cyber Operations Analyst). They explore how the Framework serves as a common language for communicating adversary threat behaviors and discuss its evolution from an internal project to a community-driven resource.<br/><br/>The latest version of the MITRE ATT&amp;CK Framework version 14 was released on Halloween, emphasizing new features like the addition of new defensive information and techniques they previously said no to including. They discuss the decision-making process behind incorporating new techniques, such as Financial Theft, Impersonation, Phishing: Spearphishing Voice, and Phishing for Information: Spearphishing Voice.<br/><br/>The conversation continues on the following topics:<br/>[5:00] MITRE ATT&amp;CK Framework<br/>[9:25] Improving cybersecurity detection<br/>[13:00] New ATT&amp;CK techniques<br/>[16:00] Decisions about which techniques to add<br/>[23:00] Mobile ATT&amp;CK<br/>[30:00] Decisions about which trends to include<br/>[37:00] Feedback about the Framework<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/threat-reference/mitre-attack-framework' target='_blank' rel='noreferrer noopener'>What is the MITRE ATT&amp;CK Framework?</a><br/><a href='https://attack.mitre.org/' target='_blank' rel='noreferrer noopener'>https://attack.mitre.org/ </a><br/><a href='https://medium.com/mitre-attack/attack-v14-fa473603f86b' target='_blank' rel='noreferrer noopener'>https://medium.com/mitre-attack/attack-v14-fa473603f86b</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491632-mitre-att-ck-evolves-with-cyber-threat-sophistication.mp3" length="36435853" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8536zmavxvrldjr44ugve6xmbvfp?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57839661</guid>
    <pubDate>Wed, 29 Nov 2023 04:00:03 -0500</pubDate>
    <itunes:duration>3034</itunes:duration>
    <itunes:keywords>cybersecurity</itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Looking Behind the Curtain at the Palestinian-Aligned TA402</itunes:title>
    <title>Looking Behind the Curtain at the Palestinian-Aligned TA402</title>
    <itunes:summary><![CDATA[Send us fan mail! While the current Israeli/Palestinian conflict is on everyone’s minds, how many are thinking about the repercussions of cyber security?    Today’s guest is returning guest, Joshua Miller, Senior Threat Researcher on the APT team at Proofpoint. While he focuses on different Middle East, North African state-aligned threats, he is talking today about a Palestinian-aligned threat group coined TA402.  While there is no direct link to Hamas, their activities support the Palestinia...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>While the current Israeli/Palestinian conflict is on everyone’s minds, how many are thinking about the repercussions of cyber security?  <br/><br/>Today’s guest is returning guest, Joshua Miller, Senior Threat Researcher on the APT team at Proofpoint. While he focuses on different Middle East, North African state-aligned threats, he is talking today about a Palestinian-aligned threat group coined TA402.<br/><br/>While there is no direct link to Hamas, their activities support the Palestinian Territories. Joshua paints a vivid picture of TA402&apos;s usual targets, strategies, and tactics, highlighting their geofencing techniques and their crafty use of compromised government agency accounts. The recent evolution of their attack chain, involving Dropbox and DLL side loading, is dissected in intricate detail, offering a glimpse into the evolving landscape of cyber threats.<br/><br/>This discussion not only provides insights into TA402&apos;s modus operandi but also emphasizes its distinctiveness from its previous malware campaigns. <br/><br/>TIMESTAMPS<br/>[1:35] Length of time tracking TA402<br/>[3:00] Differences between known government threat actors vs TA402<br/>[7:00] Other groups involved in the Israeli/Palestinian War<br/>[10:40] Normal victimology from this type of threat actor<br/>[12:30] Comparison of tactics that TA402 is deploying<br/>[19:20] Difficulties in tracking TA402<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage' target='_blank' rel='noreferrer noopener'>Ugg Boots 4 Sale: A Tale of Palestinian-Aligned Espionage</a><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' target='_blank' rel='noreferrer noopener'></a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' target='_blank' rel='noreferrer noopener'>New TA402 Molerats Malware Targets Governments in the Middle East</a><br/><a href='https://malpedia.caad.fkie.fraunhofer.de/actor/aridviper' target='_blank' rel='noreferrer noopener'>https://malpedia.caad.fkie.fraunhofer.de/actor/aridviper</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</a> <br/><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>While the current Israeli/Palestinian conflict is on everyone’s minds, how many are thinking about the repercussions of cyber security?  <br/><br/>Today’s guest is returning guest, Joshua Miller, Senior Threat Researcher on the APT team at Proofpoint. While he focuses on different Middle East, North African state-aligned threats, he is talking today about a Palestinian-aligned threat group coined TA402.<br/><br/>While there is no direct link to Hamas, their activities support the Palestinian Territories. Joshua paints a vivid picture of TA402&apos;s usual targets, strategies, and tactics, highlighting their geofencing techniques and their crafty use of compromised government agency accounts. The recent evolution of their attack chain, involving Dropbox and DLL side loading, is dissected in intricate detail, offering a glimpse into the evolving landscape of cyber threats.<br/><br/>This discussion not only provides insights into TA402&apos;s modus operandi but also emphasizes its distinctiveness from its previous malware campaigns. <br/><br/>TIMESTAMPS<br/>[1:35] Length of time tracking TA402<br/>[3:00] Differences between known government threat actors vs TA402<br/>[7:00] Other groups involved in the Israeli/Palestinian War<br/>[10:40] Normal victimology from this type of threat actor<br/>[12:30] Comparison of tactics that TA402 is deploying<br/>[19:20] Difficulties in tracking TA402<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage' target='_blank' rel='noreferrer noopener'>Ugg Boots 4 Sale: A Tale of Palestinian-Aligned Espionage</a><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' target='_blank' rel='noreferrer noopener'></a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' target='_blank' rel='noreferrer noopener'>New TA402 Molerats Malware Targets Governments in the Middle East</a><br/><a href='https://malpedia.caad.fkie.fraunhofer.de/actor/aridviper' target='_blank' rel='noreferrer noopener'>https://malpedia.caad.fkie.fraunhofer.de/actor/aridviper</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</a> <br/><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491633-looking-behind-the-curtain-at-the-palestinian-aligned-ta402.mp3" length="16634339" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7sodp9v543sj3kgr7gp1lh4pa7gt?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57625030</guid>
    <pubDate>Tue, 14 Nov 2023 04:00:03 -0500</pubDate>
    <itunes:duration>1383</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unmasking the Tricksters: The World of Fake Browser Updates</itunes:title>
    <title>Unmasking the Tricksters: The World of Fake Browser Updates</title>
    <itunes:summary><![CDATA[Send us fan mail! How can you tell when a website (yes, a website) is compromised? These threats are pretty crafty because they aren't out to target specific individuals; they just wait for folks like you and me to innocently click on compromised websites during our regular browsing.   But these threats don't stop at casual browsing. They sneak into emails, social media, search engines, and even web alerts. They're like chameleons, adapting to different situations. Our guest today is Dusty Mi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How can you tell when a website (yes, a website) is compromised? These threats are pretty crafty because they aren&apos;t out to target specific individuals; they just wait for folks like you and me to innocently click on compromised websites during our regular browsing. <br/><br/>But these threats don&apos;t stop at casual browsing. They sneak into emails, social media, search engines, and even web alerts. They&apos;re like chameleons, adapting to different situations.<br/>Our guest today is Dusty Miller, a Threat Detection Analyst at Proofpoint. He identifies four key groups: SocGholish, RogueRaticate/FakeSG, ZPHP/SmartApeSG, and ClearFake. Each has its own style and tricks, but they all love using that tempting fake browser update ruse.<br/><br/>These threats work because they exploit our trust in websites we&apos;ve visited before. Users tend to trust websites they&apos;ve visited before, making them more susceptible to clicking on fake browser update prompts.<br/><br/>Responding to these threats isn&apos;t a walk in the park for defenders. To tackle them effectively, you need to pinpoint which specific threat you&apos;re dealing with and respond accordingly. It&apos;s like playing a game with multiple rulebooks; you&apos;ve got to know which one you&apos;re up against.<br/><br/>TIMESTAMPS<br/>[1:45] Fake Browser Opportunities<br/>[5:00] Threat Actors Using Malware<br/>[9:00] Browser Malware Clusters &amp; Tactics<br/>[18:00] Combating Fake Updates<br/>[19:00] Naming New Malware<br/>[28:00] Why These Threats<br/><br/>Resources mentioned:<br/><a href='https://podcasts.apple.com/us/podcast/why-do-we-click-understanding-the-psychology-of/id1612506550?i=1000598665562' target='_blank' rel='noreferrer noopener'>Dr. Bob Hausmann Episode</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/are-you-sure-your-browser-date-current-landscape-fake-browser-updates' target='_blank' rel='noreferrer noopener'>“Are You Sure Your Browser is Up to Date?...” by Dusty Miller</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How can you tell when a website (yes, a website) is compromised? These threats are pretty crafty because they aren&apos;t out to target specific individuals; they just wait for folks like you and me to innocently click on compromised websites during our regular browsing. <br/><br/>But these threats don&apos;t stop at casual browsing. They sneak into emails, social media, search engines, and even web alerts. They&apos;re like chameleons, adapting to different situations.<br/>Our guest today is Dusty Miller, a Threat Detection Analyst at Proofpoint. He identifies four key groups: SocGholish, RogueRaticate/FakeSG, ZPHP/SmartApeSG, and ClearFake. Each has its own style and tricks, but they all love using that tempting fake browser update ruse.<br/><br/>These threats work because they exploit our trust in websites we&apos;ve visited before. Users tend to trust websites they&apos;ve visited before, making them more susceptible to clicking on fake browser update prompts.<br/><br/>Responding to these threats isn&apos;t a walk in the park for defenders. To tackle them effectively, you need to pinpoint which specific threat you&apos;re dealing with and respond accordingly. It&apos;s like playing a game with multiple rulebooks; you&apos;ve got to know which one you&apos;re up against.<br/><br/>TIMESTAMPS<br/>[1:45] Fake Browser Opportunities<br/>[5:00] Threat Actors Using Malware<br/>[9:00] Browser Malware Clusters &amp; Tactics<br/>[18:00] Combating Fake Updates<br/>[19:00] Naming New Malware<br/>[28:00] Why These Threats<br/><br/>Resources mentioned:<br/><a href='https://podcasts.apple.com/us/podcast/why-do-we-click-understanding-the-psychology-of/id1612506550?i=1000598665562' target='_blank' rel='noreferrer noopener'>Dr. Bob Hausmann Episode</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/are-you-sure-your-browser-date-current-landscape-fake-browser-updates' target='_blank' rel='noreferrer noopener'>“Are You Sure Your Browser is Up to Date?...” by Dusty Miller</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491634-unmasking-the-tricksters-the-world-of-fake-browser-updates.mp3" length="22847055" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cef1knysbcz3upgfk8jwf0op23vx?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57445354</guid>
    <pubDate>Tue, 31 Oct 2023 04:00:04 -0400</pubDate>
    <itunes:duration>1901</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Decoding the Malware Maze: Insights From a Threat Researcher</itunes:title>
    <title>Decoding the Malware Maze: Insights From a Threat Researcher</title>
    <itunes:summary><![CDATA[Send us fan mail! Oh the days when spam was the only concern for email security!  Our guest today is Chris Wakelin, a Senior Threat Researcher at Proofpoint. He recounts the era when email attachments were plain text, and the concept of malicious URLs had yet to become prevalent. Chris was a pioneer in implementing email security measures and recalled introducing Spam Assassin, an early open-source program for spam detection, at his university.  Chris emphasized his belief in not shipping ema...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Oh the days when spam was the only concern for email security!<br/><br/>Our guest today is Chris Wakelin, a Senior Threat Researcher at Proofpoint. He recounts the era when email attachments were plain text, and the concept of malicious URLs had yet to become prevalent. Chris was a pioneer in implementing email security measures and recalled introducing Spam Assassin, an early open-source program for spam detection, at his university.<br/><br/>Chris emphasized his belief in not shipping emails into a black hole (where emails are never seen by humans and they do not return error but instead directing them to spam folders or rejecting them at the gateway.) He stressed the importance of precision in cybersecurity, a lesson learned from his mathematical background.<br/><br/>TIMESTAMPS<br/>[5:00] First Spam Filtering Implementation<br/>[6:00] Spam Assassin<br/>[12:15] Differences between static/dynamic detections and various signatures<br/>[14:00] Running the Sandbox<br/>[19:00] Naming New Malware<br/>[23:50] Best Practices<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents' target='_blank' rel='noreferrer noopener'>LCG Kit Blog</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel' target='_blank' rel='noreferrer noopener'>TA 558 Blog</a><br/><a href='https://rules.emergingthreats.net/open/' target='_blank' rel='noreferrer noopener'>ET Open Rule Set</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Oh the days when spam was the only concern for email security!<br/><br/>Our guest today is Chris Wakelin, a Senior Threat Researcher at Proofpoint. He recounts the era when email attachments were plain text, and the concept of malicious URLs had yet to become prevalent. Chris was a pioneer in implementing email security measures and recalled introducing Spam Assassin, an early open-source program for spam detection, at his university.<br/><br/>Chris emphasized his belief in not shipping emails into a black hole (where emails are never seen by humans and they do not return error but instead directing them to spam folders or rejecting them at the gateway.) He stressed the importance of precision in cybersecurity, a lesson learned from his mathematical background.<br/><br/>TIMESTAMPS<br/>[5:00] First Spam Filtering Implementation<br/>[6:00] Spam Assassin<br/>[12:15] Differences between static/dynamic detections and various signatures<br/>[14:00] Running the Sandbox<br/>[19:00] Naming New Malware<br/>[23:50] Best Practices<br/><br/>Resources mentioned:<br/><a href='https://www.proofpoint.com/us/threat-insight/post/lcg-kit-sophisticated-builder-malicious-microsoft-office-documents' target='_blank' rel='noreferrer noopener'>LCG Kit Blog</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel' target='_blank' rel='noreferrer noopener'>TA 558 Blog</a><br/><a href='https://rules.emergingthreats.net/open/' target='_blank' rel='noreferrer noopener'>ET Open Rule Set</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491635-decoding-the-malware-maze-insights-from-a-threat-researcher.mp3" length="24333844" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6nit1yt485i6clw3f3m6et95k29e?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57259978</guid>
    <pubDate>Tue, 17 Oct 2023 04:30:03 -0400</pubDate>
    <itunes:duration>2025</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Obfuscated: Online Threats and the Visually Impaired</itunes:title>
    <title>Obfuscated: Online Threats and the Visually Impaired</title>
    <itunes:summary><![CDATA[Send us fan mail! Billions of dollars in losses is bad enough. But when a friend loses $1,000 on a platform he trusted, online fraud gets personal.  In this podcast episode, we dive deep into the world of online fraud with the personal account of Tim Utzig, a Senior Associate Analyst at Anser and friend of his Selena Larson. Utzig, who is blind, lost $1,000 in an online scam. His story highlights the difficulties and risksof being a person with a disability in an online world that enables cyb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Billions of dollars in losses is bad enough. But when a friend loses $1,000 on a platform he trusted, online fraud gets personal.<br/><br/>In this podcast episode, we dive deep into the world of online fraud with the personal account of Tim Utzig, a Senior Associate Analyst at Anser and friend of his Selena Larson. Utzig, who is blind, lost $1,000 in an online scam. His story highlights the difficulties and risksof being a person with a disability in an online world that enables cyber crime and often neglects accessibility.<br/><br/>Timothy Kromphardt, an email fraud researcher at Proofpoint, used his expertise tracking scams and engaging directly with threat actors to help Utzif recover. He explains the complexities of cyber crime investigations and the roadblocks to bringing scammers to justice.<br/><br/><br/><br/>TIMESTAMPS<br/>[1:00] Twitter scam story<br/>[6:00] Viewing images with a screen reader<br/>[8:45] Scam Busting<br/>[12:30] Cautions to scam busting<br/>[17:40] Unraveling the Twitter scam follow up<br/>[20:20] Involvement of the police force &amp; government<br/>[26:35] Protection techniques for people with disabilities<br/>[27:20] Key characteristics of fraud<br/><br/>Resources mentioned:<br/><a href='https://www.wired.com/story/twitter-laptop-scam-hunters/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/twitter-laptop-scam-hunters/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Billions of dollars in losses is bad enough. But when a friend loses $1,000 on a platform he trusted, online fraud gets personal.<br/><br/>In this podcast episode, we dive deep into the world of online fraud with the personal account of Tim Utzig, a Senior Associate Analyst at Anser and friend of his Selena Larson. Utzig, who is blind, lost $1,000 in an online scam. His story highlights the difficulties and risksof being a person with a disability in an online world that enables cyber crime and often neglects accessibility.<br/><br/>Timothy Kromphardt, an email fraud researcher at Proofpoint, used his expertise tracking scams and engaging directly with threat actors to help Utzif recover. He explains the complexities of cyber crime investigations and the roadblocks to bringing scammers to justice.<br/><br/><br/><br/>TIMESTAMPS<br/>[1:00] Twitter scam story<br/>[6:00] Viewing images with a screen reader<br/>[8:45] Scam Busting<br/>[12:30] Cautions to scam busting<br/>[17:40] Unraveling the Twitter scam follow up<br/>[20:20] Involvement of the police force &amp; government<br/>[26:35] Protection techniques for people with disabilities<br/>[27:20] Key characteristics of fraud<br/><br/>Resources mentioned:<br/><a href='https://www.wired.com/story/twitter-laptop-scam-hunters/' target='_blank' rel='noreferrer noopener'>https://www.wired.com/story/twitter-laptop-scam-hunters/</a><br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491636-obfuscated-online-threats-and-the-visually-impaired.mp3" length="20709925" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0ui0xkjojn9iwdstz37rj1psoc6e?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/57053435</guid>
    <pubDate>Wed, 04 Oct 2023 04:00:03 -0400</pubDate>
    <itunes:duration>1723</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DISCARDED: Live with John Hultquist!</itunes:title>
    <title>DISCARDED: Live with John Hultquist!</title>
    <itunes:summary><![CDATA[Send us fan mail! Live from New York City, it’s your Discarded podcast team at Protect 2023! Joining Selena Larson, is our special guest, John Hultquist, Chief Analyst at Mandiant, now part of Google Cloud.  They discuss various cybersecurity threats and activities of nation-states like Russia, China, and North Korea. China stands out as it hasn't executed significant destructive cyberattacks like its peers. Most of China's cyber activity involves intellectual property theft, targeting dissid...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Live from New York City, it’s your Discarded podcast team at Protect 2023! Joining Selena Larson, is our special guest, John Hultquist, Chief Analyst at Mandiant, now part of Google Cloud.<br/><br/>They discuss various cybersecurity threats and activities of nation-states like Russia, China, and North Korea. China stands out as it hasn&apos;t executed significant destructive cyberattacks like its peers. Most of China&apos;s cyber activity involves intellectual property theft, targeting dissidents, and espionage. However, there&apos;s growing concern about their interest in critical infrastructure, particularly in times of geopolitical tension. Russia, on the other hand, has a history of destructive and disruptive attacks, such as those seen in the Middle East and South Korea.<br/><br/>They also discuss the role of threat intelligence and information sharing in combating cyber threats, emphasizing the importance of responsible government involvement in providing leads to the cybersecurity community.<br/><br/>Of course, the influence of AI in cyber threat creation is also covered, particularly in generating fake media and content.<br/><br/>[4:00] China sets themselves apart<br/>[8:00] Concerns about cyber enabled kinetic impacts<br/>[14:00] Thoughts about Russia and Ukraine<br/>[20:00] Techniques that analysts would find helpful<br/>[24:00] Target anticipations for 2024<br/><br/>Resources mentioned:<br/><br/><a href='https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited<br/></a><a href='https://www.cyberwarcon.com/' target='_blank' rel='noreferrer noopener'>https://www.cyberwarcon.com/</a><a href='https://www.goodreads.com/en/book/show/41436213' target='_blank' rel='noreferrer noopener'>https://www.goodreads.com/en/book/show/41436213</a><br/><a href='https://www.reuters.com/article/us-france-election-macron-cyber-idUSKBN17Q200' target='_blank' rel='noreferrer noopener'>https://www.reuters.com/article/us-france-election-macron-cyber-idUSKBN17Q200</a><br/><a href='https://www.helpnetsecurity.com/2015/07/08/sophisticated-successful-morpho-apt-group-is-after-corporate-data/' target='_blank' rel='noreferrer noopener'>https://www.helpnetsecurity.com/2015/07/08/sophisticated-successful-morpho-apt-group-is-after-corporate-data/</a><br/><a href='https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/' target='_blank' rel='noreferrer noopener'>https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/</a><br/><a href='https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton</a><br/><a href='https://podcast.silverado.org/episodes/how-russian-intelligence-operatives-have-attacked-ukraine-in-cyberspace-interview-with-ukrainian-security-service' target='_blank' rel='noreferrer noopener'>https://podcast.silverado.org/episodes/how-russian-intelligence-operatives-have-attacked-ukraine-in-cyberspace-interview-with-ukrainian-security-service</a> <br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Live from New York City, it’s your Discarded podcast team at Protect 2023! Joining Selena Larson, is our special guest, John Hultquist, Chief Analyst at Mandiant, now part of Google Cloud.<br/><br/>They discuss various cybersecurity threats and activities of nation-states like Russia, China, and North Korea. China stands out as it hasn&apos;t executed significant destructive cyberattacks like its peers. Most of China&apos;s cyber activity involves intellectual property theft, targeting dissidents, and espionage. However, there&apos;s growing concern about their interest in critical infrastructure, particularly in times of geopolitical tension. Russia, on the other hand, has a history of destructive and disruptive attacks, such as those seen in the Middle East and South Korea.<br/><br/>They also discuss the role of threat intelligence and information sharing in combating cyber threats, emphasizing the importance of responsible government involvement in providing leads to the cybersecurity community.<br/><br/>Of course, the influence of AI in cyber threat creation is also covered, particularly in generating fake media and content.<br/><br/>[4:00] China sets themselves apart<br/>[8:00] Concerns about cyber enabled kinetic impacts<br/>[14:00] Thoughts about Russia and Ukraine<br/>[20:00] Techniques that analysts would find helpful<br/>[24:00] Target anticipations for 2024<br/><br/>Resources mentioned:<br/><br/><a href='https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/threat-actors-generative-ai-limited<br/></a><a href='https://www.cyberwarcon.com/' target='_blank' rel='noreferrer noopener'>https://www.cyberwarcon.com/</a><a href='https://www.goodreads.com/en/book/show/41436213' target='_blank' rel='noreferrer noopener'>https://www.goodreads.com/en/book/show/41436213</a><br/><a href='https://www.reuters.com/article/us-france-election-macron-cyber-idUSKBN17Q200' target='_blank' rel='noreferrer noopener'>https://www.reuters.com/article/us-france-election-macron-cyber-idUSKBN17Q200</a><br/><a href='https://www.helpnetsecurity.com/2015/07/08/sophisticated-successful-morpho-apt-group-is-after-corporate-data/' target='_blank' rel='noreferrer noopener'>https://www.helpnetsecurity.com/2015/07/08/sophisticated-successful-morpho-apt-group-is-after-corporate-data/</a><br/><a href='https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/' target='_blank' rel='noreferrer noopener'>https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/</a><br/><a href='https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/attackers-deploy-new-ics-attack-framework-triton</a><br/><a href='https://podcast.silverado.org/episodes/how-russian-intelligence-operatives-have-attacked-ukraine-in-cyberspace-interview-with-ukrainian-security-service' target='_blank' rel='noreferrer noopener'>https://podcast.silverado.org/episodes/how-russian-intelligence-operatives-have-attacked-ukraine-in-cyberspace-interview-with-ukrainian-security-service</a> <br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491637-discarded-live-with-john-hultquist.mp3" length="22294835" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jinyczhm96quil43wyalv9gxij28?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56890308</guid>
    <pubDate>Fri, 22 Sep 2023 04:00:02 -0400</pubDate>
    <itunes:duration>1854</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave</itunes:title>
    <title>From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave</title>
    <itunes:summary><![CDATA[Send us fan mail! Regardless of location, it’s important to understand what is happening in the global threat landscape because we are a global economy. What affects one region may affect one closer to home.   Part of the reason Brazil has become a recent hotbed is the amount of online population is expanding rapidly. Today’s guest, Jared Peck (Senior Threat Researcher at Proofpoint), dives deeper into his knowledge of this region and breaks down the unusual characteristics.   [3:30] The thre...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Regardless of location, it’s important to understand what is happening in the global threat landscape because we are a global economy. What affects one region may affect one closer to home. <br/><br/>Part of the reason Brazil has become a recent hotbed is the amount of online population is expanding rapidly. Today’s guest, Jared Peck (Senior Threat Researcher at Proofpoint), dives deeper into his knowledge of this region and breaks down the unusual characteristics. <br/><br/>[3:30] The threat landscape in Brazil <br/>[5:20] Brazilian banking malware being financially motivated<br/>[9:10] Credential theft in Brazil<br/>[13:30] Identifying threat actor clusters<br/>[17:00] Types of Brazilian campaigns<br/>[21:00] Diversity of malware leaders<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Regardless of location, it’s important to understand what is happening in the global threat landscape because we are a global economy. What affects one region may affect one closer to home. <br/><br/>Part of the reason Brazil has become a recent hotbed is the amount of online population is expanding rapidly. Today’s guest, Jared Peck (Senior Threat Researcher at Proofpoint), dives deeper into his knowledge of this region and breaks down the unusual characteristics. <br/><br/>[3:30] The threat landscape in Brazil <br/>[5:20] Brazilian banking malware being financially motivated<br/>[9:10] Credential theft in Brazil<br/>[13:30] Identifying threat actor clusters<br/>[17:00] Types of Brazilian campaigns<br/>[21:00] Diversity of malware leaders<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491638-from-rio-to-madrid-unmasking-the-brazilian-banking-malware-wave.mp3" length="20883922" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/a4bhr8o9b1hvmlwuzd6hwepjxelo?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56699472</guid>
    <pubDate>Tue, 05 Sep 2023 10:10:07 -0400</pubDate>
    <itunes:duration>1736</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Everything Comes Back in Style: How Old TTPs are Remerging in China&#39;s E-Crime Ecosystem</itunes:title>
    <title>Everything Comes Back in Style: How Old TTPs are Remerging in China&#39;s E-Crime Ecosystem</title>
    <itunes:summary><![CDATA[Send us fan mail! Just like a forensic scientist, the job of a threat analyst is to search for the digital fingerprints. The key is to have a starting reference point, and then being able to see what is off from there.  Our guest today is Bryan Campbell, a Staff Threat Analyst at Proofpoint. He breaks down what is happening on the China cybercrime threat landscape, as well as, the importance of staying aware of past trends.   Join us as we also discuss: [7:09] The Renaissance of Chinese malwa...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Just like a forensic scientist, the job of a threat analyst is to search for the digital fingerprints. The key is to have a starting reference point, and then being able to see what is off from there.<br/><br/>Our guest today is Bryan Campbell, a Staff Threat Analyst at Proofpoint. He breaks down what is happening on the China cybercrime threat landscape, as well as, the importance of staying aware of past trends.<br/> <br/>Join us as we also discuss:<br/>[7:09] The Renaissance of Chinese malware in email data<br/>[12:05] Chinese themed malware and malware families<br/>[13:55] The campaigns delivering this type of malware<br/>[20:00] How the China cybercrime landscape has changed<br/>[25:04] Expectations for the future <br/>[28:32] LLMs being used for these circumstances<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Just like a forensic scientist, the job of a threat analyst is to search for the digital fingerprints. The key is to have a starting reference point, and then being able to see what is off from there.<br/><br/>Our guest today is Bryan Campbell, a Staff Threat Analyst at Proofpoint. He breaks down what is happening on the China cybercrime threat landscape, as well as, the importance of staying aware of past trends.<br/> <br/>Join us as we also discuss:<br/>[7:09] The Renaissance of Chinese malware in email data<br/>[12:05] Chinese themed malware and malware families<br/>[13:55] The campaigns delivering this type of malware<br/>[20:00] How the China cybercrime landscape has changed<br/>[25:04] Expectations for the future <br/>[28:32] LLMs being used for these circumstances<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491639-everything-comes-back-in-style-how-old-ttps-are-remerging-in-china-s-e-crime-ecosystem.mp3" length="26729634" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bswx2vhvee12gje5n2j0axhcxari?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56550777</guid>
    <pubDate>Tue, 22 Aug 2023 04:00:03 -0400</pubDate>
    <itunes:duration>2223</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It Works on My Machine: Why and How Engineering Skills Matter in Threat Research</itunes:title>
    <title>It Works on My Machine: Why and How Engineering Skills Matter in Threat Research</title>
    <itunes:summary><![CDATA[Send us fan mail! Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share.   They emphasize the importance of understanding the requirements and context of security researchers to build effective tools. The conversation touches on the potential impact of AI and LLMs (large language models) in threat research. While AI tools can be va...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share. <br/><br/>They emphasize the importance of understanding the requirements and context of security researchers to build effective tools. The conversation touches on the potential impact of AI and LLMs (large language models) in threat research. While AI tools can be valuable for entry-level tasks, the context, experience, and expertise of human engineers are essential for handling complex code and understanding threat actors&apos; behaviors.<br/><br/>Join us as we also discuss:<br/>[02:59] The uniqueness of engineering skills in understanding researchers&apos; requirements for data cleaning, tool development, and working in a security environment.<br/><br/>[11:06] How the versioning in malware samples can provide insights into the threat actors&apos; behavior and trajectory.<br/><br/>[13:24] How malware is simply software with malicious intent, and how practices of developers and threat actors can overlap.<br/><br/>[17:10] The tools and techniques used by threat actors, including obfuscation and encryption methods.<br/><br/>[21:42] The importance of context and experience in writing tools and understanding researchers&apos; workflows.<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Engineering skills can play a massively beneficial role in cyber security, as Pim Trouerbach, a Senior Reverse Engineer at Proofpoint and Jacob Latonis, Senior Threat Research Engineer at Proofpoint, are able to share. <br/><br/>They emphasize the importance of understanding the requirements and context of security researchers to build effective tools. The conversation touches on the potential impact of AI and LLMs (large language models) in threat research. While AI tools can be valuable for entry-level tasks, the context, experience, and expertise of human engineers are essential for handling complex code and understanding threat actors&apos; behaviors.<br/><br/>Join us as we also discuss:<br/>[02:59] The uniqueness of engineering skills in understanding researchers&apos; requirements for data cleaning, tool development, and working in a security environment.<br/><br/>[11:06] How the versioning in malware samples can provide insights into the threat actors&apos; behavior and trajectory.<br/><br/>[13:24] How malware is simply software with malicious intent, and how practices of developers and threat actors can overlap.<br/><br/>[17:10] The tools and techniques used by threat actors, including obfuscation and encryption methods.<br/><br/>[21:42] The importance of context and experience in writing tools and understanding researchers&apos; workflows.<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491640-it-works-on-my-machine-why-and-how-engineering-skills-matter-in-threat-research.mp3" length="33276139" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6zjqxwyoh7sn3mdb2e5yppmckhfa?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56399392</guid>
    <pubDate>Tue, 08 Aug 2023 04:00:02 -0400</pubDate>
    <itunes:duration>2768</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>An Apple a Day Won&#39;t Keep Iranian APT Away: How TA453 Targets Macs</itunes:title>
    <title>An Apple a Day Won&#39;t Keep Iranian APT Away: How TA453 Targets Macs</title>
    <itunes:summary><![CDATA[Send us fan mail! What is new with Iranian actor TA453, and what is happening with their attack chains?  To answer these questions, today’s guest is Joshua Miller, a Senior Threat Researcher on the APT team at Proofpoint. Since his last visit, Joshua has published new research on TA453, highlighting new malware and social engineering techniques, which can be found here.  Join us as we discuss the following: [1:25]  What’s new with threat actor T453 [2:35] Multi Persona Impersonation [6:25] Us...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>What is new with Iranian actor TA453, and what is happening with their attack chains? <br/>To answer these questions, today’s guest is Joshua Miller, a Senior Threat Researcher on the APT team at Proofpoint. Since his last visit, Joshua has published new research on TA453, highlighting new malware and social engineering techniques, which can be found <a href='https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware' target='_blank' rel='noreferrer noopener'>here</a>.<br/><br/>Join us as we discuss the following:<br/>[1:25]  What’s new with threat actor T453<br/>[2:35] Multi Persona Impersonation<br/>[6:25] Use case of LNKs in the attack chain<br/>[8:10] Use of free cloud services<br/>[11:15] Attacking different operating systems<br/>[16:15] Convoluted attack chains<br/>[27:40] Collaborating with researchers, like Dropbox<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>What is new with Iranian actor TA453, and what is happening with their attack chains? <br/>To answer these questions, today’s guest is Joshua Miller, a Senior Threat Researcher on the APT team at Proofpoint. Since his last visit, Joshua has published new research on TA453, highlighting new malware and social engineering techniques, which can be found <a href='https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware' target='_blank' rel='noreferrer noopener'>here</a>.<br/><br/>Join us as we discuss the following:<br/>[1:25]  What’s new with threat actor T453<br/>[2:35] Multi Persona Impersonation<br/>[6:25] Use case of LNKs in the attack chain<br/>[8:10] Use of free cloud services<br/>[11:15] Attacking different operating systems<br/>[16:15] Convoluted attack chains<br/>[27:40] Collaborating with researchers, like Dropbox<br/><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<b><br/></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491641-an-apple-a-day-won-t-keep-iranian-apt-away-how-ta453-targets-macs.mp3" length="25701850" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/o39r0f43u8wdi5j4lb74hmh68xwm?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56198268</guid>
    <pubDate>Tue, 25 Jul 2023 04:00:03 -0400</pubDate>
    <itunes:duration>2137</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threats and Risks in the Global South</itunes:title>
    <title>Threats and Risks in the Global South</title>
    <itunes:summary><![CDATA[Send us fan mail! When researching cyber threats, there is a bias towards to the West and most of Europe. But what about the global majority?  Today’s guest is Martijn Grooten, a Digital Security Threat Analyst with Internews. With 16 years of experience in cybersecurity, he has recently focused on the impact of security for at risk groups and people.   Join us as we discuss the following: Outdated ideas of security for the general publicCommon trends geographicallyThe distinction of threats ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>When researching cyber threats, there is a bias towards to the West and most of Europe. But what about the global majority?<br/><br/>Today’s guest is Martijn Grooten, a Digital Security Threat Analyst with Internews. With 16 years of experience in cybersecurity, he has recently focused on the impact of security for at risk groups and people. <br/><br/>Join us as we discuss the following:<br/><ul><li>Outdated ideas of security for the general public</li><li>Common trends geographically</li><li>The distinction of threats between devices</li></ul><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Resources:<br/>Martijn’s BotConf talk: <a href='https://youtu.be/CcqOy6WdUjw' target='_blank' rel='noreferrer noopener'>https://youtu.be/CcqOy6WdUjw</a><br/>Martijn on social media: <a href='https://twitter.com/martijn_grooten?lang=en' target='_blank' rel='noreferrer noopener'>Twitter</a>, <a href='https://mastodon.social/@martijn_grooten' target='_blank' rel='noreferrer noopener'>Mastodon</a>, <a href='https://www.linkedin.com/in/martijngrooten/' target='_blank' rel='noreferrer noopener'>LinkedIn</a>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>When researching cyber threats, there is a bias towards to the West and most of Europe. But what about the global majority?<br/><br/>Today’s guest is Martijn Grooten, a Digital Security Threat Analyst with Internews. With 16 years of experience in cybersecurity, he has recently focused on the impact of security for at risk groups and people. <br/><br/>Join us as we discuss the following:<br/><ul><li>Outdated ideas of security for the general public</li><li>Common trends geographically</li><li>The distinction of threats between devices</li></ul><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>.<br/><br/>Resources:<br/>Martijn’s BotConf talk: <a href='https://youtu.be/CcqOy6WdUjw' target='_blank' rel='noreferrer noopener'>https://youtu.be/CcqOy6WdUjw</a><br/>Martijn on social media: <a href='https://twitter.com/martijn_grooten?lang=en' target='_blank' rel='noreferrer noopener'>Twitter</a>, <a href='https://mastodon.social/@martijn_grooten' target='_blank' rel='noreferrer noopener'>Mastodon</a>, <a href='https://www.linkedin.com/in/martijngrooten/' target='_blank' rel='noreferrer noopener'>LinkedIn</a>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491642-threats-and-risks-in-the-global-south.mp3" length="31277563" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5snbby8luyc0jyfzu5psouqeyyu4?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/56035045</guid>
    <pubDate>Tue, 11 Jul 2023 04:00:03 -0400</pubDate>
    <itunes:duration>2603</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Weird &amp; Wacky Researcher Summer: The Artifacts &amp; Detections Edition</itunes:title>
    <title>Weird &amp; Wacky Researcher Summer: The Artifacts &amp; Detections Edition</title>
    <itunes:summary><![CDATA[Send us fan mail! It's shaping up to be a weird and wacky summer for threat researchers.  While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic.   Join us as we discuss the following: Where the team identifies on the Cyber Alignment ChartUse of celebrity names within email luresRecent PDF anticsUpdates about activity from current threat actors For more informatio...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>It&apos;s shaping up to be a weird and wacky summer for threat researchers.<br/><br/>While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic. <br/><b><br/>Join us as we discuss the following:</b><br/><ul><li>Where the team identifies on the Cyber Alignment Chart</li><li>Use of celebrity names within email lures</li><li>Recent PDF antics</li><li>Updates about activity from current threat actors</li></ul><b><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>! </b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>It&apos;s shaping up to be a weird and wacky summer for threat researchers.<br/><br/>While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic. <br/><b><br/>Join us as we discuss the following:</b><br/><ul><li>Where the team identifies on the Cyber Alignment Chart</li><li>Use of celebrity names within email lures</li><li>Recent PDF antics</li><li>Updates about activity from current threat actors</li></ul><b><br/>For more information, <a href='https://www.proofpoint.com/us/podcasts' target='_blank' rel='noreferrer noopener'>check out our website</a>! </b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491643-weird-wacky-researcher-summer-the-artifacts-detections-edition.mp3" length="26849204" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rao2144b1g82pj8kap6hns61bfg2?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/55157857</guid>
    <pubDate>Tue, 27 Jun 2023 04:00:03 -0400</pubDate>
    <itunes:duration>2234</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It&#39;s Summertime: What’s the E-crime Vibe?</itunes:title>
    <title>It&#39;s Summertime: What’s the E-crime Vibe?</title>
    <itunes:summary><![CDATA[Send us fan mail! Who’s quiet and who’s making noise? What’s the backchannel chatter over at Proofpoint?  Proofpoint threat researchers Joe Wise and Pim Trouerbach join this week’s episode to discuss the e-crime vibe for the first half of 2023.   Join us as we discuss the following: Emotet’s activity, or lack thereofChaotic vibes from IcedIDTA570 and TA577 setting trends]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Who’s quiet and who’s making noise? What’s the backchannel chatter over at Proofpoint?<br/><br/>Proofpoint threat researchers Joe Wise and Pim Trouerbach join this week’s episode to discuss the e-crime vibe for the first half of 2023. <br/><br/>Join us as we discuss the following: <ul><li>Emotet’s activity, or lack thereof</li><li>Chaotic vibes from IcedID</li><li>TA570 and TA577 setting trends</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Who’s quiet and who’s making noise? What’s the backchannel chatter over at Proofpoint?<br/><br/>Proofpoint threat researchers Joe Wise and Pim Trouerbach join this week’s episode to discuss the e-crime vibe for the first half of 2023. <br/><br/>Join us as we discuss the following: <ul><li>Emotet’s activity, or lack thereof</li><li>Chaotic vibes from IcedID</li><li>TA570 and TA577 setting trends</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491644-it-s-summertime-what-s-the-e-crime-vibe.mp3" length="32058193" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/66dbnak06k3ghb5t2chskm84t2cm?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/54406548</guid>
    <pubDate>Wed, 14 Jun 2023 13:16:11 -0400</pubDate>
    <itunes:duration>2669</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When the Threat Profile is High: Protecting At-Risk Individuals Online</itunes:title>
    <title>When the Threat Profile is High: Protecting At-Risk Individuals Online</title>
    <itunes:summary><![CDATA[Send us fan mail! How does cybercrime threaten individual reporters? What about an entire newsroom?  What if you’re an average person who suddenly becomes the center of a dark conspiracy theory?   Welcome to the world of cybersecurity for at-risk individuals. In this episode, renowned cybersecurity expert, Runa Sandvik joins to talk about her work protecting journalists and newsrooms from powerful attackers.    Join us as we discuss the following:  Protecting personal and corporate devices an...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How does cybercrime threaten individual reporters? What about an entire newsroom? <br/>What if you’re an average person who suddenly becomes the center of a dark conspiracy theory? <br/><br/>Welcome to the world of cybersecurity for at-risk individuals. In this episode, renowned cybersecurity expert, Runa Sandvik joins to talk about her work protecting journalists and newsrooms from powerful attackers. <b><br/></b><br/><b></b><br/><b>Join us as we discuss the following: </b><br/><ul><li>Protecting personal and corporate devices and accounts for high risk individuals</li><li>Common security gaps found in highly targeted organizations</li><li>Effectively using cybersecurity tools</li><li>Communicating cybersecurity guidance in the workplace</li></ul><b>Resources:</b><br/><ul><li><b><a href='https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/' target='_blank' rel='noreferrer noopener'>https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/</a></b></li><li><b><a href='https://www.nbcnews.com/tech/misinformation/tiffany-dover-conspiracy-theorists-silence-rcna69401' target='_blank' rel='noreferrer noopener'>https://www.nbcnews.com/tech/misinformation/tiffany-dover-conspiracy-theorists-silence-rcna69401</a></b></li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How does cybercrime threaten individual reporters? What about an entire newsroom? <br/>What if you’re an average person who suddenly becomes the center of a dark conspiracy theory? <br/><br/>Welcome to the world of cybersecurity for at-risk individuals. In this episode, renowned cybersecurity expert, Runa Sandvik joins to talk about her work protecting journalists and newsrooms from powerful attackers. <b><br/></b><br/><b></b><br/><b>Join us as we discuss the following: </b><br/><ul><li>Protecting personal and corporate devices and accounts for high risk individuals</li><li>Common security gaps found in highly targeted organizations</li><li>Effectively using cybersecurity tools</li><li>Communicating cybersecurity guidance in the workplace</li></ul><b>Resources:</b><br/><ul><li><b><a href='https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/' target='_blank' rel='noreferrer noopener'>https://www.reuters.com/business/media-telecom/reuters-reporters-online-accounts-faked-approach-china-activists-2023-02-28/</a></b></li><li><b><a href='https://www.nbcnews.com/tech/misinformation/tiffany-dover-conspiracy-theorists-silence-rcna69401' target='_blank' rel='noreferrer noopener'>https://www.nbcnews.com/tech/misinformation/tiffany-dover-conspiracy-theorists-silence-rcna69401</a></b></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491645-when-the-threat-profile-is-high-protecting-at-risk-individuals-online.mp3" length="23213086" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zwkmlkp6g40m6ai97enwx8mmx76b?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/54043840</guid>
    <pubDate>Tue, 30 May 2023 13:12:32 -0400</pubDate>
    <itunes:duration>1932</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Spies and Stalkers of Surveillance Capitalism</itunes:title>
    <title>The Spies and Stalkers of Surveillance Capitalism</title>
    <itunes:summary><![CDATA[Send us fan mail! A brief note on content for today's episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today's show.   If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighbor, or your ex?   In this episode, Proofpoint security research engineer, Chris Talib discusses high-ticket mobile spyware, the...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><b><i>A brief note on content for today&apos;s episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today&apos;s show. </i></b><br/><b><br/></b>If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighbor, or your ex? <br/><br/>In this episode, Proofpoint security research engineer, Chris Talib discusses high-ticket mobile spyware, the proliferation of low-cost stalkerware, surveillance capitalism and why he believes technology can’t solve social problems. <br/><br/>Join us as we discuss the following: <br/><ul><li>Mobile spyware tools</li><li>The impact of low cost stalkerware</li><li>Moral and ethical implications of developing spyware</li><li>The role of governments,organizations and activists in protecting citizen’s right to privacy</li></ul><b>Resources:</b><br/><ul><li><b><a href='https://www.laquadrature.net/en/' target='_blank' rel='noreferrer noopener'>https://www.laquadrature.net/en/</a></b></li><li><b><a href='https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/' target='_blank' rel='noreferrer noopener'>https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/</a></b></li><li><b><a href='https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/?sh=110a6e2464c3' target='_blank' rel='noreferrer noopener'>https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/?sh=110a6e2464c3</a></b></li><li><b><a href='https://www.eff.org/' target='_blank' rel='noreferrer noopener'>https://www.eff.org/</a></b></li><li><b><a href='https://tacticaltech.org/' target='_blank' rel='noreferrer noopener'>https://tacticaltech.org/</a></b></li><li><b><a href='https://defensive-lab.agency/' target='_blank' rel='noreferrer noopener'>https://defensive-lab.agency/</a></b></li><li><b><a href='https://echap.eu.org/' target='_blank' rel='noreferrer noopener'>https://echap.eu.org/</a></b></li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><b><i>A brief note on content for today&apos;s episode, we are going to be discussing or mentioning stalking, domestic abuse, and sex trafficking in today&apos;s show. </i></b><br/><b><br/></b>If you’re a threat actor with a million dollar budget targeting high ranked targets like dissidents, activists, journalists and politicians, how do you do it? What if you’d like to stalk your neighbor, or your ex? <br/><br/>In this episode, Proofpoint security research engineer, Chris Talib discusses high-ticket mobile spyware, the proliferation of low-cost stalkerware, surveillance capitalism and why he believes technology can’t solve social problems. <br/><br/>Join us as we discuss the following: <br/><ul><li>Mobile spyware tools</li><li>The impact of low cost stalkerware</li><li>Moral and ethical implications of developing spyware</li><li>The role of governments,organizations and activists in protecting citizen’s right to privacy</li></ul><b>Resources:</b><br/><ul><li><b><a href='https://www.laquadrature.net/en/' target='_blank' rel='noreferrer noopener'>https://www.laquadrature.net/en/</a></b></li><li><b><a href='https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/' target='_blank' rel='noreferrer noopener'>https://www.amnesty.org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/</a></b></li><li><b><a href='https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/?sh=110a6e2464c3' target='_blank' rel='noreferrer noopener'>https://www.forbes.com/sites/thomasbrewster/2023/04/06/sex-traffickers-use-parenting-apps-like-life360-to-spy-on-victims/?sh=110a6e2464c3</a></b></li><li><b><a href='https://www.eff.org/' target='_blank' rel='noreferrer noopener'>https://www.eff.org/</a></b></li><li><b><a href='https://tacticaltech.org/' target='_blank' rel='noreferrer noopener'>https://tacticaltech.org/</a></b></li><li><b><a href='https://defensive-lab.agency/' target='_blank' rel='noreferrer noopener'>https://defensive-lab.agency/</a></b></li><li><b><a href='https://echap.eu.org/' target='_blank' rel='noreferrer noopener'>https://echap.eu.org/</a></b></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491646-the-spies-and-stalkers-of-surveillance-capitalism.mp3" length="26839877" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/m274fc1c3q2kla1yioavc7qy4hc5?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53890596</guid>
    <pubDate>Tue, 16 May 2023 10:45:05 -0400</pubDate>
    <itunes:duration>2233</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beyond Banking: IcedID Gets Forked</itunes:title>
    <title>Beyond Banking: IcedID Gets Forked</title>
    <itunes:summary><![CDATA[Send us fan mail! At least three threat actors are ushering in a new era for IcedID, originally classified as banking malware in 2017. In this episode, Proofpoint researchers, Joe Wise and Pim Trouerbach, are here to share their research on the Lite and Forked IcedID variants   Join us as we discuss the following: Lite IcedID VariantForked IcedID VariantThe key differences between the variantsWhich operators the Proofpoint team hypothesizes are behind the attacks  Resources: https://www.proof...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>At least three threat actors are ushering in a new era for IcedID, originally classified as banking malware in 2017. In this episode, Proofpoint researchers, Joe Wise and Pim Trouerbach, are here to share their research on the Lite and Forked IcedID variants <br/><br/>Join us as we discuss the following:<br/><ul><li>Lite IcedID Variant</li><li>Forked IcedID Variant</li><li>The key differences between the variants</li><li>Which operators the Proofpoint team hypothesizes are behind the attacks</li></ul><b><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid</a></b>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>At least three threat actors are ushering in a new era for IcedID, originally classified as banking malware in 2017. In this episode, Proofpoint researchers, Joe Wise and Pim Trouerbach, are here to share their research on the Lite and Forked IcedID variants <br/><br/>Join us as we discuss the following:<br/><ul><li>Lite IcedID Variant</li><li>Forked IcedID Variant</li><li>The key differences between the variants</li><li>Which operators the Proofpoint team hypothesizes are behind the attacks</li></ul><b><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid</a></b>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491647-beyond-banking-icedid-gets-forked.mp3" length="33364720" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wr1xq3f4pbsyqq8h241d9kqycsv8?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53681107</guid>
    <pubDate>Tue, 02 May 2023 08:00:02 -0400</pubDate>
    <itunes:duration>2778</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>“Did I miss you in Orlando?”: The Rise of SMS Phishing</itunes:title>
    <title>“Did I miss you in Orlando?”: The Rise of SMS Phishing</title>
    <itunes:summary><![CDATA[Send us fan mail! In this podcast episode, Proofpoint senior threat researcher, Adam McNeil, joins us to talk about conversational SMS phishing. These campaigns target mobile devices and often start with a simple, innocuous question.   “Are you coming to dinner tomorrow?” can lead to anything from fraud to impersonation to financial schemes and is considered a $3 billion threat.  In this episode, we discuss the following:  Why a threat actor would choose a conversational SMS campaignDifferent...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this podcast episode, Proofpoint senior threat researcher, Adam McNeil, joins us to talk about conversational SMS phishing. These campaigns target mobile devices and often start with a simple, innocuous question. <br/><br/>“Are you coming to dinner tomorrow?” can lead to anything from fraud to impersonation to financial schemes and is considered a $3 billion threat. <br/>In this episode, we discuss the following: <br/><ul><li>Why a threat actor would choose a conversational SMS campaign</li><li>Different scams associated with conversational SMS phishing</li><li>Lack of awareness surrounding mobile threats</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this podcast episode, Proofpoint senior threat researcher, Adam McNeil, joins us to talk about conversational SMS phishing. These campaigns target mobile devices and often start with a simple, innocuous question. <br/><br/>“Are you coming to dinner tomorrow?” can lead to anything from fraud to impersonation to financial schemes and is considered a $3 billion threat. <br/>In this episode, we discuss the following: <br/><ul><li>Why a threat actor would choose a conversational SMS campaign</li><li>Different scams associated with conversational SMS phishing</li><li>Lack of awareness surrounding mobile threats</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491648-did-i-miss-you-in-orlando-the-rise-of-sms-phishing.mp3" length="19847354" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6nslkbbci2e23yu1filzz88k7304?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53564623</guid>
    <pubDate>Tue, 18 Apr 2023 03:00:02 -0400</pubDate>
    <itunes:duration>1651</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Staying Ahead of Cloud-Based Threats: Insights on today&#39;s threat landscape</itunes:title>
    <title>Staying Ahead of Cloud-Based Threats: Insights on today&#39;s threat landscape</title>
    <itunes:summary><![CDATA[Send us fan mail! Cloud threats are a growing concern due to users' and organizations' increasing adoption of cloud computing. It's crucial to develop the skills needed to identify and analyze cloud-based threats and know the latest security tools and techniques to detect, prevent, and respond to cloud-based attacks.  Ultimately, security researchers and analysts play a critical role in helping organizations mitigate cloud-related risks and ensure the security of their cloud environments. In ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cloud threats are a growing concern due to users&apos; and organizations&apos; increasing adoption of cloud computing. It&apos;s crucial to develop the skills needed to identify and analyze cloud-based threats and know the latest security tools and techniques to detect, prevent, and respond to cloud-based attacks.<br/><br/>Ultimately, security researchers and analysts play a critical role in helping organizations mitigate cloud-related risks and ensure the security of their cloud environments. In this episode, Eilon Bendet, from the Proofpoint cloud threat research team, joins us to discuss the cloud threats he is seeing. <br/>In this episode, we discuss the following: <ul><li>Cloud threat Detection and landscape </li><li> Main objectives for threat actors when they leverage the cloud </li><li>How users and organization can best protect themselves</li></ul>Additional Resources: <br/>Cloud Threats &amp; Cloud Threat Landscape <br/><ul><li><a href='https://www.proofpoint.com/us/threat-reference/casb' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/threat-reference/casb </a></li></ul><br/><br/><br/><br/><ul><li><a href='https://www.proofpoint.com/us/corporate-blog/post/dont-let-cloud-threats-rain-your-parade' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/corporate-blog/post/dont-let-cloud-threats-rain-your-parade </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/resources/webinars/deep-dive-latest-cloud-threats-microsoft-environments' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/resources/webinars/deep-dive-latest-cloud-threats-microsoft-environments </a></li></ul><br/><br/><br/><br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cloud threats are a growing concern due to users&apos; and organizations&apos; increasing adoption of cloud computing. It&apos;s crucial to develop the skills needed to identify and analyze cloud-based threats and know the latest security tools and techniques to detect, prevent, and respond to cloud-based attacks.<br/><br/>Ultimately, security researchers and analysts play a critical role in helping organizations mitigate cloud-related risks and ensure the security of their cloud environments. In this episode, Eilon Bendet, from the Proofpoint cloud threat research team, joins us to discuss the cloud threats he is seeing. <br/>In this episode, we discuss the following: <ul><li>Cloud threat Detection and landscape </li><li> Main objectives for threat actors when they leverage the cloud </li><li>How users and organization can best protect themselves</li></ul>Additional Resources: <br/>Cloud Threats &amp; Cloud Threat Landscape <br/><ul><li><a href='https://www.proofpoint.com/us/threat-reference/casb' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/threat-reference/casb </a></li></ul><br/><br/><br/><br/><ul><li><a href='https://www.proofpoint.com/us/corporate-blog/post/dont-let-cloud-threats-rain-your-parade' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/corporate-blog/post/dont-let-cloud-threats-rain-your-parade </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/corporate-blog/post/microsoft-office-365-attacks-circumvent-multi-factor-authentication-lead-account </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/cloud-security/proofpoint-analyzes-potentially-dangerous-functionality-microsoft-sway-enables </a></li></ul><br/><ul><li><a href='https://www.proofpoint.com/us/resources/webinars/deep-dive-latest-cloud-threats-microsoft-environments' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/resources/webinars/deep-dive-latest-cloud-threats-microsoft-environments </a></li></ul><br/><br/><br/><br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491649-staying-ahead-of-cloud-based-threats-insights-on-today-s-threat-landscape.mp3" length="22260178" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bccbihh15ujr1mje8g8en1s1y7ae?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53472835</guid>
    <pubDate>Fri, 07 Apr 2023 13:18:50 -0400</pubDate>
    <itunes:duration>1852</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cat-phishing Dogfighters</itunes:title>
    <title>Cat-phishing Dogfighters</title>
    <itunes:summary><![CDATA[Send us fan mail!  In the cyber threat intelligence and cybersecurity world, there is a growing recognition of the value of professionals with diverse backgrounds and skillsets. While many individuals in the field come from traditional computer science or engineering backgrounds, there is also a trend of people entering the field from unexpected paths. Sarah Sabotka, Senior Threat Researcher at Proofpoint, joins us on this episode to discuss her background in animal cruelty investigations.  I...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><br/>In the cyber threat intelligence and cybersecurity world, there is a growing recognition of the value of professionals with diverse backgrounds and skillsets. While many individuals in the field come from traditional computer science or engineering backgrounds, there is also a trend of people entering the field from unexpected paths. Sarah Sabotka, Senior Threat Researcher at Proofpoint, joins us on this episode to discuss her background in animal cruelty investigations. <br/>In this episode, we discuss the following: <ul><li>What a typical day in the life of an animal cruelty investigator looks like</li><li>How Sarah used social engineering and open-source intelligence (OSINT) to build cases</li><li>How non-traditional skills and experiences have translated to success in infosec</li></ul>Resources: <br/><ul><li><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a </a></li><li><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36</a> </li><li><a href='https://www.mandiant.com/resources/blog/cti-analyst-core-competencies-framework' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/cti-analyst-core-competencies-framework</a> </li></ul>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!<br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p><br/>In the cyber threat intelligence and cybersecurity world, there is a growing recognition of the value of professionals with diverse backgrounds and skillsets. While many individuals in the field come from traditional computer science or engineering backgrounds, there is also a trend of people entering the field from unexpected paths. Sarah Sabotka, Senior Threat Researcher at Proofpoint, joins us on this episode to discuss her background in animal cruelty investigations. <br/>In this episode, we discuss the following: <ul><li>What a typical day in the life of an animal cruelty investigator looks like</li><li>How Sarah used social engineering and open-source intelligence (OSINT) to build cases</li><li>How non-traditional skills and experiences have translated to success in infosec</li></ul>Resources: <br/><ul><li><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a </a></li><li><a href='https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36' target='_blank' rel='noreferrer noopener'>https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36</a> </li><li><a href='https://www.mandiant.com/resources/blog/cti-analyst-core-competencies-framework' target='_blank' rel='noreferrer noopener'>https://www.mandiant.com/resources/blog/cti-analyst-core-competencies-framework</a> </li></ul>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!<br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491650-cat-phishing-dogfighters.mp3" length="22915794" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/u5paypc2oc6789irvw4ie1uf1uju?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53283964</guid>
    <pubDate>Tue, 21 Mar 2023 13:01:37 -0400</pubDate>
    <itunes:duration>1906</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Prank or Propaganda? TA499 Pesters Politics</itunes:title>
    <title>Prank or Propaganda? TA499 Pesters Politics</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Zydeca Cass, Senior Threat Researcher at Proofpoint, joins the show to discuss Russia-aligned threat actor TA499. Zydeca dives into what makes tracking this threat actor so unique.   Join us as we discuss: Who TA499 are and what they do What makes their activity a cyber threat others should pay attention to What their activity tells us about Russia-aligned groupsHow to prevent being exploited Check out these resources we mentioned:https://www.proofpoint.com/...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Zydeca Cass, Senior Threat Researcher at Proofpoint, joins the show to discuss Russia-aligned threat actor TA499. Zydeca dives into what makes tracking this threat actor so unique. <br/><br/>Join us as we discuss:<br/><ul><li>Who TA499 are and what they do </li><li>What makes their activity a cyber threat others should pay attention to </li><li>What their activity tells us about Russia-aligned groups</li><li>How to prevent being exploited </li></ul>Check out these resources we mentioned:<ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests</a></li><li><a href='https://www.theguardian.com/world/2022/mar/21/video-released-showing-russian-hoax-call-with-uk-defence-secretary' target='_blank' rel='noreferrer noopener'>https://www.theguardian.com/world/2022/mar/21/video-released-showing-russian-hoax-call-with-uk-defence-secretary</a></li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Zydeca Cass, Senior Threat Researcher at Proofpoint, joins the show to discuss Russia-aligned threat actor TA499. Zydeca dives into what makes tracking this threat actor so unique. <br/><br/>Join us as we discuss:<br/><ul><li>Who TA499 are and what they do </li><li>What makes their activity a cyber threat others should pay attention to </li><li>What their activity tells us about Russia-aligned groups</li><li>How to prevent being exploited </li></ul>Check out these resources we mentioned:<ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests</a></li><li><a href='https://www.theguardian.com/world/2022/mar/21/video-released-showing-russian-hoax-call-with-uk-defence-secretary' target='_blank' rel='noreferrer noopener'>https://www.theguardian.com/world/2022/mar/21/video-released-showing-russian-hoax-call-with-uk-defence-secretary</a></li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491651-prank-or-propaganda-ta499-pesters-politics.mp3" length="28285211" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/t47yik3srs450wevghhr99n32872?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/53126890</guid>
    <pubDate>Tue, 07 Mar 2023 14:57:20 -0500</pubDate>
    <itunes:duration>2353</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Venture Mindset: North Korean Actors Go Beyond Espionage</itunes:title>
    <title>A Venture Mindset: North Korean Actors Go Beyond Espionage</title>
    <itunes:summary><![CDATA[Send us fan mail! We’ve discussed a handful of APT actors on the Discarded podcast, like Russia, Iran, China and Turkey. In this episode, we dive into the isolated world of North Korean aligned actors with Sr. Threat Researcher, Greg Lesnewich.   In this episode, we discuss the following:  The role DPRK’s culture of isolation has played in its approach to cyber espionageOverview of TA444 and what makes them different in the landscapeTA444s relationship with cryptocurrency Resources:  https://...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>We’ve discussed a handful of APT actors on the Discarded podcast, like Russia, Iran, China and Turkey. In this episode, we dive into the isolated world of North Korean aligned actors with Sr. Threat Researcher, Greg Lesnewich. <br/><br/>In this episode, we discuss the following: <br/><ul><li>The role DPRK’s culture of isolation has played in its approach to cyber espionage</li><li>Overview of TA444 and what makes them different in the landscape</li><li>TA444s relationship with cryptocurrency</li></ul><br/>Resources: <br/><ul><li><a href='https://www.technologyreview.com/2020/09/10/1008282/north-korea-hackers-money-laundering-cryptocurrency-bitcoin/' target='_blank' rel='noreferrer noopener'>https://www.technologyreview.com/2020/09/10/1008282/north-korea-hackers-money-laundering-cryptocurrency-bitcoin/</a></li><li><a href='https://cyberscoop.com/north-korea-lazarus-group-bangladesh-bank-donald-trump-xi-jinping/' target='_blank' rel='noreferrer noopener'>https://cyberscoop.com/north-korea-lazarus-group-bangladesh-bank-donald-trump-xi-jinping/</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds</a></li><li><a href='https://www.recordedfuture.com/north-korea-internet-tool' target='_blank' rel='noreferrer noopener'>https://www.recordedfuture.com/north-korea-internet-tool</a> - <a href='https://go.recordedfuture.com/hubfs/reports/cta-2020-0209.pdf' target='_blank' rel='noreferrer noopener'>https://go.recordedfuture.com/hubfs/reports/cta-2020-0209.pdf</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>We’ve discussed a handful of APT actors on the Discarded podcast, like Russia, Iran, China and Turkey. In this episode, we dive into the isolated world of North Korean aligned actors with Sr. Threat Researcher, Greg Lesnewich. <br/><br/>In this episode, we discuss the following: <br/><ul><li>The role DPRK’s culture of isolation has played in its approach to cyber espionage</li><li>Overview of TA444 and what makes them different in the landscape</li><li>TA444s relationship with cryptocurrency</li></ul><br/>Resources: <br/><ul><li><a href='https://www.technologyreview.com/2020/09/10/1008282/north-korea-hackers-money-laundering-cryptocurrency-bitcoin/' target='_blank' rel='noreferrer noopener'>https://www.technologyreview.com/2020/09/10/1008282/north-korea-hackers-money-laundering-cryptocurrency-bitcoin/</a></li><li><a href='https://cyberscoop.com/north-korea-lazarus-group-bangladesh-bank-donald-trump-xi-jinping/' target='_blank' rel='noreferrer noopener'>https://cyberscoop.com/north-korea-lazarus-group-bangladesh-bank-donald-trump-xi-jinping/</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds</a></li><li><a href='https://www.recordedfuture.com/north-korea-internet-tool' target='_blank' rel='noreferrer noopener'>https://www.recordedfuture.com/north-korea-internet-tool</a> - <a href='https://go.recordedfuture.com/hubfs/reports/cta-2020-0209.pdf' target='_blank' rel='noreferrer noopener'>https://go.recordedfuture.com/hubfs/reports/cta-2020-0209.pdf</a></li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491652-a-venture-mindset-north-korean-actors-go-beyond-espionage.mp3" length="29031386" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7zrrpc99uiw9vgednvoo4pr7d8oq?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/52803059</guid>
    <pubDate>Tue, 21 Feb 2023 11:31:19 -0500</pubDate>
    <itunes:duration>2416</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Do We Click? Understanding the Psychology of Social Engineering</itunes:title>
    <title>Why Do We Click? Understanding the Psychology of Social Engineering</title>
    <itunes:summary><![CDATA[Send us fan mail! Social engineering is a technique used by attackers to manipulate individuals into performing actions that may put their personal or sensitive information at risk. Attackers know the biggest weakness in cybersecurity is humans—and with this, leverage socially engineered phishing emails to manipulate the human psychology. In this episode, we have Dr. Bob Hausmann, Learning and Assessment Architect, joining us to discuss the psychology behind user engagement with phishing.   I...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Social engineering is a technique used by attackers to manipulate individuals into performing actions that may put their personal or sensitive information at risk. Attackers know the biggest weakness in cybersecurity is humans—and with this, leverage socially engineered phishing emails to manipulate the human psychology. In this episode, we have Dr. Bob Hausmann, Learning and Assessment Architect, joining us to discuss the psychology behind user engagement with phishing. <br/><br/>In this episode, we discuss the following: <br/><ul><li>The Zone of Proximal Development</li><li>What the Adaptive Learning Framework is</li><li>Where ethical lines should be drawn with phishing simulations</li><li>Psychology of social engineering in threat actor approaches</li></ul><br/><br/>Additional resources: <br/><ul><li><a href='https://www.proofpoint.com/us/blog/security-awareness-training/adaptive-learning-framework-security-awareness-training' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/security-awareness-training/adaptive-learning-framework-security-awareness-training</a></li><li><a href='https://www.forrester.com/report/the-future-of-security-awareness-and-training/RES178339' target='_blank' rel='noreferrer noopener'>https://www.forrester.com/report/the-future-of-security-awareness-and-training/RES178339</a></li><li><a href='https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working' target='_blank' rel='noreferrer noopener'>https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working</a></li><li><a href='https://twitter.com/threatinsight/status/1612888307645485086' target='_blank' rel='noreferrer noopener'>https://twitter.com/threatinsight/status/1612888307645485086</a></li><li>Daniel Pink Autonomy, Mastery &amp; Purpose: <a href='https://www.youtube.com/watch?v=rbR2V1UeB_A&amp;feature=youtu.be' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=rbR2V1UeB_A&amp;feature=youtu.be</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</a></li><li>Stay Puft Marshmallow Man: <a href='https://www.youtube.com/watch?v=2zhDfUAQSbs&amp;ab_channel=Ghostbusters' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=2zhDfUAQSbs&amp;ab_channel=Ghostbusters</a></li><li>2023 State of the Phish Report: Publishing on February 28, 2023 on proofpoint.com</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Social engineering is a technique used by attackers to manipulate individuals into performing actions that may put their personal or sensitive information at risk. Attackers know the biggest weakness in cybersecurity is humans—and with this, leverage socially engineered phishing emails to manipulate the human psychology. In this episode, we have Dr. Bob Hausmann, Learning and Assessment Architect, joining us to discuss the psychology behind user engagement with phishing. <br/><br/>In this episode, we discuss the following: <br/><ul><li>The Zone of Proximal Development</li><li>What the Adaptive Learning Framework is</li><li>Where ethical lines should be drawn with phishing simulations</li><li>Psychology of social engineering in threat actor approaches</li></ul><br/><br/>Additional resources: <br/><ul><li><a href='https://www.proofpoint.com/us/blog/security-awareness-training/adaptive-learning-framework-security-awareness-training' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/security-awareness-training/adaptive-learning-framework-security-awareness-training</a></li><li><a href='https://www.forrester.com/report/the-future-of-security-awareness-and-training/RES178339' target='_blank' rel='noreferrer noopener'>https://www.forrester.com/report/the-future-of-security-awareness-and-training/RES178339</a></li><li><a href='https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working' target='_blank' rel='noreferrer noopener'>https://www.ncsc.gov.uk/blog-post/telling-users-to-avoid-clicking-bad-links-still-isnt-working</a></li><li><a href='https://twitter.com/threatinsight/status/1612888307645485086' target='_blank' rel='noreferrer noopener'>https://twitter.com/threatinsight/status/1612888307645485086</a></li><li>Daniel Pink Autonomy, Mastery &amp; Purpose: <a href='https://www.youtube.com/watch?v=rbR2V1UeB_A&amp;feature=youtu.be' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=rbR2V1UeB_A&amp;feature=youtu.be</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</a></li><li>Stay Puft Marshmallow Man: <a href='https://www.youtube.com/watch?v=2zhDfUAQSbs&amp;ab_channel=Ghostbusters' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=2zhDfUAQSbs&amp;ab_channel=Ghostbusters</a></li><li>2023 State of the Phish Report: Publishing on February 28, 2023 on proofpoint.com</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491653-why-do-we-click-understanding-the-psychology-of-social-engineering.mp3" length="42337564" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kd3rfhoplm98d3zlaksntjldkr0z?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/52664759</guid>
    <pubDate>Wed, 08 Feb 2023 09:35:54 -0500</pubDate>
    <itunes:duration>3524</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New Year, New Threats: Prepping for the 2023 Threat Landscape</itunes:title>
    <title>New Year, New Threats: Prepping for the 2023 Threat Landscape</title>
    <itunes:summary><![CDATA[Send us fan mail! A new year has arrived! The 2022 threat landscape had some extremely notable activity, from Russian APT actors to Microsoft's blocking of macros. We saw a lot and can guarantee threat actors won't be slowing down in 2023 and will continue to be a major threat to organizations. In this episode, Threat Research Managers, Alexis Dorais-Joncas, Rich Gonzalaz and Daniel Blackford, join us to share their perspectives on the 2023 threat landscape. Join us as we discuss the followin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>A new year has arrived! The 2022 threat landscape had some extremely notable activity, from Russian APT actors to Microsoft&apos;s blocking of macros. We saw a lot and can guarantee threat actors won&apos;t be slowing down in 2023 and will continue to be a major threat to organizations. In this episode, Threat Research Managers, Alexis Dorais-Joncas, Rich Gonzalaz and Daniel Blackford, join us to share their perspectives on the 2023 threat landscape. Join us as we discuss the following:  <br/><ul><li>What our experts are anticipating in 2023  </li><li>How vulnerabilities help in detection creation  </li><li>Emerging techniques that could be used by malicious actors  </li></ul>Additional resources:  <br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo</a>  </li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a> </li></ul>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>A new year has arrived! The 2022 threat landscape had some extremely notable activity, from Russian APT actors to Microsoft&apos;s blocking of macros. We saw a lot and can guarantee threat actors won&apos;t be slowing down in 2023 and will continue to be a major threat to organizations. In this episode, Threat Research Managers, Alexis Dorais-Joncas, Rich Gonzalaz and Daniel Blackford, join us to share their perspectives on the 2023 threat landscape. Join us as we discuss the following:  <br/><ul><li>What our experts are anticipating in 2023  </li><li>How vulnerabilities help in detection creation  </li><li>Emerging techniques that could be used by malicious actors  </li></ul>Additional resources:  <br/><ul><li><a href='https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo</a>  </li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a> </li></ul>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491654-new-year-new-threats-prepping-for-the-2023-threat-landscape.mp3" length="28489163" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6b33pr4qjins3b4ciueqsds19snj?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/52532617</guid>
    <pubDate>Tue, 24 Jan 2023 14:55:19 -0500</pubDate>
    <itunes:duration>2370</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Confidence, confusion, cashout: How pig butchering is blindsiding victims</itunes:title>
    <title>Confidence, confusion, cashout: How pig butchering is blindsiding victims</title>
    <itunes:summary><![CDATA[Send us fan mail! Threat actors are disarming their victims with a new approach: The long game. Instead of asking for money or gift cards upfront, they build a connection and confidence until they cash in on the big payout. In this episode of Discarded, Selena Larson and Crista Giering are joined by Proofpoint team members: Tim Kromphardt, Email Fraud Researcher, and Genina Po, Threat Analyst, to discuss socially engineered attacks and how victims are tricked.   Join us as we discuss:Understa...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Threat actors are disarming their victims with a new approach: The long game. Instead of asking for money or gift cards upfront, they build a connection and confidence until they cash in on the big payout. In this episode of Discarded, Selena Larson and Crista Giering are joined by Proofpoint team members: Tim Kromphardt, Email Fraud Researcher, and Genina Po, Threat Analyst, to discuss socially engineered attacks and how victims are tricked. <br/><br/>Join us as we discuss:<ul><li>Understanding what pig butchering is</li><li>How the scam blindsides victims</li><li>The evolution of the fraud from China to other countries in Asia</li></ul>Resources mentioned: <br/><ul><li><a href='https://www.rappler.com/business/chinese-mafia-trafficking-filipinos-lure-lonely-professionals-cryptocurrency-scam/' target='_blank' rel='noreferrer noopener'>https://www.rappler.com/business/chinese-mafia-trafficking-filipinos-lure-lonely-professionals-cryptocurrency-scam/</a></li><li><a href='https://finance.yahoo.com/news/chinese-mafia-forcing-filipinos-crypto-034555327.html' target='_blank' rel='noreferrer noopener'>https://finance.yahoo.com/news/chinese-mafia-forcing-filipinos-crypto-034555327.html</a></li><li><a href='https://www.youtube.com/watch?v=720qUBQZJZ0' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=720qUBQZJZ0</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a></li><li><a href='https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking' target='_blank' rel='noreferrer noopener'>https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking</a></li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening! <br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Threat actors are disarming their victims with a new approach: The long game. Instead of asking for money or gift cards upfront, they build a connection and confidence until they cash in on the big payout. In this episode of Discarded, Selena Larson and Crista Giering are joined by Proofpoint team members: Tim Kromphardt, Email Fraud Researcher, and Genina Po, Threat Analyst, to discuss socially engineered attacks and how victims are tricked. <br/><br/>Join us as we discuss:<ul><li>Understanding what pig butchering is</li><li>How the scam blindsides victims</li><li>The evolution of the fraud from China to other countries in Asia</li></ul>Resources mentioned: <br/><ul><li><a href='https://www.rappler.com/business/chinese-mafia-trafficking-filipinos-lure-lonely-professionals-cryptocurrency-scam/' target='_blank' rel='noreferrer noopener'>https://www.rappler.com/business/chinese-mafia-trafficking-filipinos-lure-lonely-professionals-cryptocurrency-scam/</a></li><li><a href='https://finance.yahoo.com/news/chinese-mafia-forcing-filipinos-crypto-034555327.html' target='_blank' rel='noreferrer noopener'>https://finance.yahoo.com/news/chinese-mafia-forcing-filipinos-crypto-034555327.html</a></li><li><a href='https://www.youtube.com/watch?v=720qUBQZJZ0' target='_blank' rel='noreferrer noopener'>https://www.youtube.com/watch?v=720qUBQZJZ0</a></li><li><a href='https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online' target='_blank' rel='noreferrer noopener'>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</a></li><li><a href='https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking' target='_blank' rel='noreferrer noopener'>https://www.vice.com/en/article/n7zb5d/pig-butchering-scam-cambodia-trafficking</a></li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening! <br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491655-confidence-confusion-cashout-how-pig-butchering-is-blindsiding-victims.mp3" length="31435363" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5oawnmkdkgxpdogx7mrg99909oxh?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/52402316</guid>
    <pubDate>Tue, 10 Jan 2023 10:58:36 -0500</pubDate>
    <itunes:duration>2616</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Holiday Happy Hour: 12 Faves of Threat Research</itunes:title>
    <title>Holiday Happy Hour: 12 Faves of Threat Research</title>
    <itunes:summary><![CDATA[Send us fan mail! As the end of year is rapidly approaching, it’s important to reflect back on some of the top learnings for the year. In this special holiday edition of The Discarded podcast, Selena and Crista are joined by Mindy Semling, Podcast Producer at Proofpoint, to answer questions on their favorite things from threat research over the past year — from blogs to malware to holiday songs, we cover it all. Join us as we discuss:Celebrating the yearThe 12 favorites A thank you to our gue...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>As the end of year is rapidly approaching, it’s important to reflect back on some of the top learnings for the year. In this special holiday edition of The Discarded podcast, Selena and Crista are joined by Mindy Semling, Podcast Producer at Proofpoint, to answer questions on their favorite things from threat research over the past year — from blogs to malware to holiday songs, we cover it all. Join us as we discuss:<ul><li>Celebrating the year</li><li>The 12 favorites </li><li>A thank you to our guests</li></ul>Resources mentioned: <br/><ul><li>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</li><li>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</li><li>https://www.proofpoint.com/us/blog/threat-insight/bumblebee-is-still-transforming </li><li>https://medium.com/mitre-attack/intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884</li><li>For more research, check out the Proofpoint Threat Insight blog: https://www.proofpoint.com/us/blog/threat-insight </li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!<br/><br/><br/>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>As the end of year is rapidly approaching, it’s important to reflect back on some of the top learnings for the year. In this special holiday edition of The Discarded podcast, Selena and Crista are joined by Mindy Semling, Podcast Producer at Proofpoint, to answer questions on their favorite things from threat research over the past year — from blogs to malware to holiday songs, we cover it all. Join us as we discuss:<ul><li>Celebrating the year</li><li>The 12 favorites </li><li>A thank you to our guests</li></ul>Resources mentioned: <br/><ul><li>https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic</li><li>https://www.proofpoint.com/us/blog/threat-insight/broken-dreams-and-piggy-banks-pig-butchering-crypto-fraud-growing-online</li><li>https://www.proofpoint.com/us/blog/threat-insight/bumblebee-is-still-transforming </li><li>https://medium.com/mitre-attack/intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884</li><li>For more research, check out the Proofpoint Threat Insight blog: https://www.proofpoint.com/us/blog/threat-insight </li></ul><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!<br/><br/><br/>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491656-holiday-happy-hour-12-faves-of-threat-research.mp3" length="23730473" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3spwtx5nmctbbkat94721chr843q?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">https://api.spreaker.com/episode/52298798</guid>
    <pubDate>Wed, 28 Dec 2022 12:02:53 -0500</pubDate>
    <itunes:duration>1974</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AMA Answers From the Threat Research Trenches</itunes:title>
    <title>AMA Answers From the Threat Research Trenches</title>
    <itunes:summary><![CDATA[Send us fan mail! In this highly entertaining episode of DISCARDED, Selena Larson and Crista Giering host a wild round of “Ask Me Anything,” with Sherrod DeGrippo, VP of Threat Research and Detection, and Daniel Blackford, Threat Researcher at Proofpoint.  Featuring insightful questions from listeners and former guests, these industry experts cover a wide range of topics, from silly to serious. Join us as we discuss: The most boring malware and common threat actor mistakes New developmen...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this highly entertaining episode of DISCARDED, Selena Larson and Crista Giering host a wild round of “Ask Me Anything,” with Sherrod DeGrippo, VP of Threat Research and Detection, and Daniel Blackford, Threat Researcher at Proofpoint. <br/>Featuring insightful questions from listeners and former guests, these industry experts cover a wide range of topics, from silly to serious.<br/>Join us as we discuss:<br/>The most boring malware and common threat actor mistakes<br/>New developments in Ukraine and the Global South<br/>A proliferation of mobile malware and sports-related attacks<br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this highly entertaining episode of DISCARDED, Selena Larson and Crista Giering host a wild round of “Ask Me Anything,” with Sherrod DeGrippo, VP of Threat Research and Detection, and Daniel Blackford, Threat Researcher at Proofpoint. <br/>Featuring insightful questions from listeners and former guests, these industry experts cover a wide range of topics, from silly to serious.<br/>Join us as we discuss:<br/>The most boring malware and common threat actor mistakes<br/>New developments in Ukraine and the Global South<br/>A proliferation of mobile malware and sports-related attacks<br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491657-ama-answers-from-the-threat-research-trenches.mp3" length="37063259" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8wy6htosx00vfnt8i34n8e2czzjq?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">c0c924f7-3966-44c8-9ad8-3964998a2f6b</guid>
    <pubDate>Tue, 13 Dec 2022 11:46:53 -0500</pubDate>
    <itunes:duration>3085</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox</itunes:title>
    <title>The Many-Faced Threat: Multi-Persona Impersonation (MPI) In Your Inbox</title>
    <itunes:summary><![CDATA[Send us fan mail! Social proof is a potent tool, even in the absence of direct support. When someone is pressured to do something in the presence of trusted peers, they are more likely to follow through unless someone objects. Unfortunately, threat actors have taken notice and are investing significant time and resources into looking like a trusted party to gain access to your personal information. Josh Miller and Sam Scholten join this episode to share their experiences with the evolving int...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Social proof is a potent tool, even in the absence of direct support. When someone is pressured to do something in the presence of trusted peers, they are more likely to follow through unless someone objects. Unfortunately, threat actors have taken notice and are investing significant time and resources into looking like a trusted party to gain access to your personal information.<br/>Josh Miller and Sam Scholten join this episode to share their experiences with the evolving intellect of attackers and their multifaceted breach strategies. Using multi-persona impersonation (MPI), attackers establish multiple accounts and increase trust by manipulating social validation — a psychological tool.<br/>Join us as we discuss:<br/>The evolution of MPIs<br/>Email fraud taxonomy<br/>The role of MPI in business email compromise<br/><br/><br/>Resources: <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework</a> <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Social proof is a potent tool, even in the absence of direct support. When someone is pressured to do something in the presence of trusted peers, they are more likely to follow through unless someone objects. Unfortunately, threat actors have taken notice and are investing significant time and resources into looking like a trusted party to gain access to your personal information.<br/>Josh Miller and Sam Scholten join this episode to share their experiences with the evolving intellect of attackers and their multifaceted breach strategies. Using multi-persona impersonation (MPI), attackers establish multiple accounts and increase trust by manipulating social validation — a psychological tool.<br/>Join us as we discuss:<br/>The evolution of MPIs<br/>Email fraud taxonomy<br/>The role of MPI in business email compromise<br/><br/><br/>Resources: <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo</a> <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework</a> <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491658-the-many-faced-threat-multi-persona-impersonation-mpi-in-your-inbox.mp3" length="19557406" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vi7vd7hwf3v8ximcuvcsf3xw25uc?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">c0c6069d-2e52-4fda-ac42-2932e0b7dab3</guid>
    <pubDate>Tue, 29 Nov 2022 14:23:14 -0500</pubDate>
    <itunes:duration>1627</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Machine Learning Is a Party With Camp Disco!</itunes:title>
    <title>Machine Learning Is a Party With Camp Disco!</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Dr. Zachary Abzug, Manager and Tech Lead of Data Science at Proofpoint joins the show to discuss a machine learning enabled tool called Camp Discovery, AKA Camp Disco and the importance of the human interaction required for making use of machine learning in malware detection. Join us as we discuss: What exactly Camp Disco is and the need/idea behind its creation How Camp Disco played a role in the discovery of Chocolatey threat activity Why Camp Disco uses i...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Dr. Zachary Abzug, Manager and Tech Lead of Data Science at Proofpoint joins the show to discuss a machine learning enabled tool called Camp Discovery, AKA Camp Disco and the importance of the human interaction required for making use of machine learning in malware detection.<br/>Join us as we discuss:<br/>What exactly Camp Disco is and the need/idea behind its creation<br/>How Camp Disco played a role in the discovery of Chocolatey threat activity<br/>Why Camp Disco uses its own neural network language model instead of an existing language model<br/>Natural Language Processing and how to teach a computer to speak “malware”    <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/engineering-insights/using-neural-network-language-model-instead-of-bert' rel='noopener'>https://www.proofpoint.com/us/blog/engineering-insights/using-neural-network-language-model-instead-of-bert</a>-gpt <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military</a>-emails <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery</a>-techniques <br/><a href='https://www.proofpoint.com/us/company/careers' rel='noopener'>https://www.proofpoint.com/us/company/careers</a>   <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Dr. Zachary Abzug, Manager and Tech Lead of Data Science at Proofpoint joins the show to discuss a machine learning enabled tool called Camp Discovery, AKA Camp Disco and the importance of the human interaction required for making use of machine learning in malware detection.<br/>Join us as we discuss:<br/>What exactly Camp Disco is and the need/idea behind its creation<br/>How Camp Disco played a role in the discovery of Chocolatey threat activity<br/>Why Camp Disco uses its own neural network language model instead of an existing language model<br/>Natural Language Processing and how to teach a computer to speak “malware”    <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/engineering-insights/using-neural-network-language-model-instead-of-bert' rel='noopener'>https://www.proofpoint.com/us/blog/engineering-insights/using-neural-network-language-model-instead-of-bert</a>-gpt <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military</a>-emails <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery</a>-techniques <br/><a href='https://www.proofpoint.com/us/company/careers' rel='noopener'>https://www.proofpoint.com/us/company/careers</a>   <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491659-machine-learning-is-a-party-with-camp-disco.mp3" length="28709693" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lkalnpw4vlnwyg3c9iuiz2azhmr4?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">61b893f4-6e45-4923-8a16-7d0dc2717f92</guid>
    <pubDate>Tue, 08 Nov 2022 19:04:43 -0500</pubDate>
    <itunes:duration>2389</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Reservation Confirmed: Threat Actors Visiting the Hospitality World</itunes:title>
    <title>Reservation Confirmed: Threat Actors Visiting the Hospitality World</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Joe Wise, Threat Researcher at Proofpoint, joins the show to discuss his and Selena’s research into a small e-crime actor, TA558 and its targeting against the hospitality and travel e-crime sector since at least 2018. Join us as we discuss: Classifying threat actors and how it relates to s’mores Understanding e-crime vs. APT actors Why hospitality and travel e-crimes are still successful TA558’s TTPs and how their consistencies have aided in Proofpoint’s att...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joe Wise, Threat Researcher at Proofpoint, joins the show to discuss his and Selena’s research into a small e-crime actor, TA558 and its targeting against the hospitality and travel e-crime sector since at least 2018.<br/>Join us as we discuss:<br/>Classifying threat actors and how it relates to s’mores<br/>Understanding e-crime vs. APT actors<br/>Why hospitality and travel e-crimes are still successful<br/>TA558’s TTPs and how their consistencies have aided in Proofpoint’s attribution of their activity over the years<br/>Joe shares his theories on why TA558 uses so many different malware types<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and</a>-travel <br/><a href='https://embed.sounder.fm/play/299042' rel='noopener'>https://embed.sounder.fm/play/299042</a>  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joe Wise, Threat Researcher at Proofpoint, joins the show to discuss his and Selena’s research into a small e-crime actor, TA558 and its targeting against the hospitality and travel e-crime sector since at least 2018.<br/>Join us as we discuss:<br/>Classifying threat actors and how it relates to s’mores<br/>Understanding e-crime vs. APT actors<br/>Why hospitality and travel e-crimes are still successful<br/>TA558’s TTPs and how their consistencies have aided in Proofpoint’s attribution of their activity over the years<br/>Joe shares his theories on why TA558 uses so many different malware types<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and</a>-travel <br/><a href='https://embed.sounder.fm/play/299042' rel='noopener'>https://embed.sounder.fm/play/299042</a>  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491660-reservation-confirmed-threat-actors-visiting-the-hospitality-world.mp3" length="28118621" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jim4ggdygud0prtetz0kdhbtyofr?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">18cf3ad5-1238-45ca-952c-c4da828afdfd</guid>
    <pubDate>Tue, 25 Oct 2022 11:47:12 -0400</pubDate>
    <itunes:duration>2340</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo</itunes:title>
    <title>The Hallow-queen of Cybersecurity: Spooky and Sweet Takes with Sherrod DeGrippo</title>
    <itunes:summary><![CDATA[Send us fan mail! Cybersecurity doesn't have to be spooky this Halloween. In this episode, Sherrod DeGrippo, VP of Threat Research and Detection at Proofpoint, joins the show to discuss all things cybersecurity awareness so you can be prepared, not scared, this October. So grab a sweet treat and pull up a seat, the Hallow-queen is about to give her hot takes! Join us as we discuss: The growing risk of TOADs (Telephone Oriented Attack Delivery) Benign phishing reconnaissance emails by threat a...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cybersecurity doesn&apos;t have to be spooky this Halloween.<br/>In this episode, Sherrod DeGrippo, VP of Threat Research and Detection at Proofpoint, joins the show to discuss all things cybersecurity awareness so you can be prepared, not scared, this October. So grab a sweet treat and pull up a seat, the Hallow-queen is about to give her hot takes!<br/>Join us as we discuss:<br/>The growing risk of TOADs (Telephone Oriented Attack Delivery)<br/>Benign phishing reconnaissance emails by threat actors<br/>What you need to know to adapt to this ever changing threat landscape<br/>Bring awareness to cybersecurity this October, even on ghost tours<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/cybersecurity-awareness' rel='noopener'>https://www.proofpoint.com/us/cybersecurity-awareness</a>-hub <br/><a href='https://www.proofpoint.com/us/products/advanced-threat-protection/et' rel='noopener'>https://www.proofpoint.com/us/products/advanced-threat-protection/et</a>-intelligence <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cybersecurity doesn&apos;t have to be spooky this Halloween.<br/>In this episode, Sherrod DeGrippo, VP of Threat Research and Detection at Proofpoint, joins the show to discuss all things cybersecurity awareness so you can be prepared, not scared, this October. So grab a sweet treat and pull up a seat, the Hallow-queen is about to give her hot takes!<br/>Join us as we discuss:<br/>The growing risk of TOADs (Telephone Oriented Attack Delivery)<br/>Benign phishing reconnaissance emails by threat actors<br/>What you need to know to adapt to this ever changing threat landscape<br/>Bring awareness to cybersecurity this October, even on ghost tours<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/cybersecurity-awareness' rel='noopener'>https://www.proofpoint.com/us/cybersecurity-awareness</a>-hub <br/><a href='https://www.proofpoint.com/us/products/advanced-threat-protection/et' rel='noopener'>https://www.proofpoint.com/us/products/advanced-threat-protection/et</a>-intelligence <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491661-the-hallow-queen-of-cybersecurity-spooky-and-sweet-takes-with-sherrod-degrippo.mp3" length="25445239" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/v8jsm4su56vecymft8ae7a3uypfy?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">8ad4a52a-b5d1-4aed-8eac-a7acfd41254e</guid>
    <pubDate>Tue, 11 Oct 2022 15:16:32 -0400</pubDate>
    <itunes:duration>2117</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Investigating Wine Fraud with the Ransomware Sommelier</itunes:title>
    <title>Investigating Wine Fraud with the Ransomware Sommelier</title>
    <itunes:summary><![CDATA[Send us fan mail! All for wine, and wine for all. But only if it isn’t fraudulent. In July 2022, Allan Liska, an analyst at Recorded Future and wine expert, released some new research on counterfeit wine, spirits and cheese. Allan joins the show as our first ever external guest to give us an overview of what that research entailed and the different types of wine fraud he’s observed. By the end of this episode, we’ll all be partners in cybercrime and wine. Join us as we discuss: What is wine f...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>All for wine, and wine for all. But only if it isn’t fraudulent.<br/>In July 2022, Allan Liska, an analyst at Recorded Future and wine expert, released some new research on counterfeit wine, spirits and cheese. Allan joins the show as our first ever external guest to give us an overview of what that research entailed and the different types of wine fraud he’s observed. By the end of this episode, we’ll all be partners in cybercrime and wine.<br/>Join us as we discuss:<br/>What is wine fraud and the different types of fraud that fall under the counterfeit umbrella<br/>How the pandemic impacted wine fraud due to happy hours<br/>Some of the techniques that wine fraudsters are using to try to legitimize the fake wines<br/>Allan’s favorite fall wines and recommendations for food pairings <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.recordedfuture.com/lockdown-rise-wine-domain-scammer' rel='noopener'>https://www.recordedfuture.com/lockdown-rise-wine-domain-scammer</a><br/><a href='https://www.recordedfuture.com/counterfeit-wine-spirits-cheese' rel='noopener'>https://www.recordedfuture.com/counterfeit-wine-spirits-cheese</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-invoice-fraud' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-invoice-fraud</a><br/><a href='https://www.decanter.com/wine-news/worlds-most-expensive-bottle-claimed-fake-as-renowned-collector-sued-93457/#' rel='noopener'>https://www.decanter.com/wine-news/worlds-most-expensive-bottle-claimed-fake-as-renowned-collector-sued-93457/#</a>:~:text=A%20billionaire%20Florida%20wine%20collector,to%20Thomas%20Jefferson%20are%20fakes<br/><a href='https://www.cbsnews.com/news/billionaire-spends-35m-to-investigate-400k-wine-fraud/' rel='noopener'>https://www.cbsnews.com/news/billionaire-spends-35m-to-investigate-400k-wine-fraud/</a><br/><a href='https://kermitlynch.com/' rel='noopener'>https://kermitlynch.com/</a><br/><a href='https://twitter.com/uuallan/status' rel='noopener'>https://twitter.com/uuallan/status</a>/1561124207727153153 <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>All for wine, and wine for all. But only if it isn’t fraudulent.<br/>In July 2022, Allan Liska, an analyst at Recorded Future and wine expert, released some new research on counterfeit wine, spirits and cheese. Allan joins the show as our first ever external guest to give us an overview of what that research entailed and the different types of wine fraud he’s observed. By the end of this episode, we’ll all be partners in cybercrime and wine.<br/>Join us as we discuss:<br/>What is wine fraud and the different types of fraud that fall under the counterfeit umbrella<br/>How the pandemic impacted wine fraud due to happy hours<br/>Some of the techniques that wine fraudsters are using to try to legitimize the fake wines<br/>Allan’s favorite fall wines and recommendations for food pairings <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.recordedfuture.com/lockdown-rise-wine-domain-scammer' rel='noopener'>https://www.recordedfuture.com/lockdown-rise-wine-domain-scammer</a><br/><a href='https://www.recordedfuture.com/counterfeit-wine-spirits-cheese' rel='noopener'>https://www.recordedfuture.com/counterfeit-wine-spirits-cheese</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-invoice-fraud' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-invoice-fraud</a><br/><a href='https://www.decanter.com/wine-news/worlds-most-expensive-bottle-claimed-fake-as-renowned-collector-sued-93457/#' rel='noopener'>https://www.decanter.com/wine-news/worlds-most-expensive-bottle-claimed-fake-as-renowned-collector-sued-93457/#</a>:~:text=A%20billionaire%20Florida%20wine%20collector,to%20Thomas%20Jefferson%20are%20fakes<br/><a href='https://www.cbsnews.com/news/billionaire-spends-35m-to-investigate-400k-wine-fraud/' rel='noopener'>https://www.cbsnews.com/news/billionaire-spends-35m-to-investigate-400k-wine-fraud/</a><br/><a href='https://kermitlynch.com/' rel='noopener'>https://kermitlynch.com/</a><br/><a href='https://twitter.com/uuallan/status' rel='noopener'>https://twitter.com/uuallan/status</a>/1561124207727153153 <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491662-investigating-wine-fraud-with-the-ransomware-sommelier.mp3" length="35953106" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/grk9z6p67kn9k2uh3h7b4cglh6f4?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">062c2060-d563-43d2-82b0-f0801353c436</guid>
    <pubDate>Tue, 27 Sep 2022 10:53:04 -0400</pubDate>
    <itunes:duration>2993</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hot off the Press: APT Actors Posing as Journalists</itunes:title>
    <title>Hot off the Press: APT Actors Posing as Journalists</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Joshua Miller and Michael Raggi, Senior Threat Researchers at Proofpoint, join the show to discuss APT groups targeting and impersonating journalists. Joshua, Michael, and Crista discovered during their research how APT actors use journalist and their leads as a form of espionage to collect sensitive information. Join us as we discuss: Proofpoint’s unique report on APTs targeting journalists and insight into the motivations behind these attacks Understanding...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joshua Miller and Michael Raggi, Senior Threat Researchers at Proofpoint, join the show to discuss APT groups targeting and impersonating journalists. Joshua, Michael, and Crista discovered during their research how APT actors use journalist and their leads as a form of espionage to collect sensitive information.<br/>Join us as we discuss:<br/>Proofpoint’s unique report on APTs targeting journalists and insight into the motivations behind these attacks<br/>Understanding the “why” behind threat actors targeting or posing as journalists and media organizations<br/>The most common methods APT actors use in these campaigns to target or pose as journalists<br/>Stories about threat actors from China, Iran, Turkey, and more<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists</a><br/>Previous episode with Joshua: <a href='https://podcasts.apple.com/us/podcast/apt-attribution-trials-and-tribulations-from-the-field/id1612506550?i=1000571269986' rel='noopener'>https://podcasts.apple.com/us/podcast/apt-attribution-trials-and-tribulations-from-the-field/id1612506550?i=1000571269986</a><br/>Previous episode with Michael: <a href='https://podcasts.apple.com/us/podcast/web-bugs-the-tubthumping-tactics-of-chinese-threat/id1612506550?i=1000558705940' rel='noopener'>https://podcasts.apple.com/us/podcast/web-bugs-the-tubthumping-tactics-of-chinese-threat/id1612506550?i=1000558705940</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joshua Miller and Michael Raggi, Senior Threat Researchers at Proofpoint, join the show to discuss APT groups targeting and impersonating journalists. Joshua, Michael, and Crista discovered during their research how APT actors use journalist and their leads as a form of espionage to collect sensitive information.<br/>Join us as we discuss:<br/>Proofpoint’s unique report on APTs targeting journalists and insight into the motivations behind these attacks<br/>Understanding the “why” behind threat actors targeting or posing as journalists and media organizations<br/>The most common methods APT actors use in these campaigns to target or pose as journalists<br/>Stories about threat actors from China, Iran, Turkey, and more<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists</a><br/>Previous episode with Joshua: <a href='https://podcasts.apple.com/us/podcast/apt-attribution-trials-and-tribulations-from-the-field/id1612506550?i=1000571269986' rel='noopener'>https://podcasts.apple.com/us/podcast/apt-attribution-trials-and-tribulations-from-the-field/id1612506550?i=1000571269986</a><br/>Previous episode with Michael: <a href='https://podcasts.apple.com/us/podcast/web-bugs-the-tubthumping-tactics-of-chinese-threat/id1612506550?i=1000558705940' rel='noopener'>https://podcasts.apple.com/us/podcast/web-bugs-the-tubthumping-tactics-of-chinese-threat/id1612506550?i=1000558705940</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491663-hot-off-the-press-apt-actors-posing-as-journalists.mp3" length="21995077" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/l2c8t3t4kwyu322agowmp9uviuw7?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">7739a7f7-a20f-441d-8642-fc41d1fd7195</guid>
    <pubDate>Tue, 13 Sep 2022 12:38:17 -0400</pubDate>
    <itunes:duration>1830</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Misfits Managed: Breaking Down Misfit Malware</itunes:title>
    <title>Misfits Managed: Breaking Down Misfit Malware</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Sara Sabotka Senior Threat Researcher on the field-facing team at Proofpoint, joins the show to chat about Misfit Malware. Although it is sometimes referred to as commodity malware, this kind of malicious software is anything but boring. You’ll want to stick around to find out who belongs on the Island of Misfit Malware and the importance of paying attention to the little gang of misfits. Join us as we discuss: How do foreign threat actors go about acquiring...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Sara Sabotka Senior Threat Researcher on the field-facing team at Proofpoint, joins the show to chat about Misfit Malware. Although it is sometimes referred to as commodity malware, this kind of malicious software is anything but boring. You’ll want to stick around to find out who belongs on the Island of Misfit Malware and the importance of paying attention to the little gang of misfits.<br/>Join us as we discuss:<br/>How do foreign threat actors go about acquiring commodity malware and how much does it cost?<br/>Why Misfit Malware is sometimes easily overlooked by security researchers and defenders<br/>Key characteristics of lures that are commonly used by threat actors who use Misfit Malware <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Sara Sabotka Senior Threat Researcher on the field-facing team at Proofpoint, joins the show to chat about Misfit Malware. Although it is sometimes referred to as commodity malware, this kind of malicious software is anything but boring. You’ll want to stick around to find out who belongs on the Island of Misfit Malware and the importance of paying attention to the little gang of misfits.<br/>Join us as we discuss:<br/>How do foreign threat actors go about acquiring commodity malware and how much does it cost?<br/>Why Misfit Malware is sometimes easily overlooked by security researchers and defenders<br/>Key characteristics of lures that are commonly used by threat actors who use Misfit Malware <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491664-misfits-managed-breaking-down-misfit-malware.mp3" length="26450882" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pgywom386fk1gsdr3i6uzwrzczqx?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">a6b0db2e-4223-484f-a9f8-8b3b2abe7813</guid>
    <pubDate>Tue, 23 Aug 2022 11:00:39 -0400</pubDate>
    <itunes:duration>2201</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Art of Threat Detection Engineering</itunes:title>
    <title>The Art of Threat Detection Engineering</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Konstantin Klinger, Senior Security Research Engineer at Proofpoint, joins the show to chat about his role on the threat research team, focusing on DDX (Detonation, Detection, and Extraction). You won’t want to miss his breakdown of the Pyramid of Pain and how to utilize it for threat detection engineering. Join us as we discuss: Real-life examples of complex attack chain with multiple steps and how to they can be detected Utilizing the Pyramid of Pain for t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Konstantin Klinger, Senior Security Research Engineer at Proofpoint, joins the show to chat about his role on the threat research team, focusing on DDX (Detonation, Detection, and Extraction). You won’t want to miss his breakdown of the Pyramid of Pain and how to utilize it for threat detection engineering.<br/>Join us as we discuss:<br/>Real-life examples of complex attack chain with multiple steps and how to they can be detected<br/>Utilizing the Pyramid of Pain for threat detection engineering<br/>How to write detections for geofencing<br/>The perks of incorporating automated MITRE ATT&amp;CK detections into your sandbox <br/><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-uses-spanish-language-lures-distribute-seldom-observed-bandook' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-uses-spanish-language-lures-distribute-seldom-observed-bandook</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage</a><br/><a href='http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html' rel='noopener'>http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Konstantin Klinger, Senior Security Research Engineer at Proofpoint, joins the show to chat about his role on the threat research team, focusing on DDX (Detonation, Detection, and Extraction). You won’t want to miss his breakdown of the Pyramid of Pain and how to utilize it for threat detection engineering.<br/>Join us as we discuss:<br/>Real-life examples of complex attack chain with multiple steps and how to they can be detected<br/>Utilizing the Pyramid of Pain for threat detection engineering<br/>How to write detections for geofencing<br/>The perks of incorporating automated MITRE ATT&amp;CK detections into your sandbox <br/><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-uses-spanish-language-lures-distribute-seldom-observed-bandook' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/new-threat-actor-uses-spanish-language-lures-distribute-seldom-observed-bandook</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/new-ta402-molerats-malware-targets-governments-middle-east</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/ugg-boots-4-sale-tale-palestinian-aligned-espionage</a><br/><a href='http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html' rel='noopener'>http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491665-the-art-of-threat-detection-engineering.mp3" length="21899538" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s5d1cy1p596qahs8hh5zhi1xx2ez?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">ac6c2d06-dd1a-42a8-93b1-413c378bbf9c</guid>
    <pubDate>Tue, 09 Aug 2022 13:19:51 -0400</pubDate>
    <itunes:duration>1822</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>APT Attribution: Trials and Tribulations From the Field</itunes:title>
    <title>APT Attribution: Trials and Tribulations From the Field</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Joshua Miller and Zydeca Cass, Senior Threat Researchers at Proofpoint, join the show to discuss attribution, specifically APT actor attribution. Joshua and Zydeca dive into their experiences of attribution successes and failures, sharing tales of threat actors impersonating Russian opposition leaders and an Iranian kidnapping plot in New York. As Crista says, the good, the bad and the ugly. Join us as we discuss: Understanding the difference between the two...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joshua Miller and Zydeca Cass, Senior Threat Researchers at Proofpoint, join the show to discuss attribution, specifically APT actor attribution. Joshua and Zydeca dive into their experiences of attribution successes and failures, sharing tales of threat actors impersonating Russian opposition leaders and an Iranian kidnapping plot in New York. As Crista says, the good, the bad and the ugly.<br/>Join us as we discuss:<br/>Understanding the difference between the two types of attribution<br/>How attribution can be used in e-crime versus state-aligned investigation<br/>Stories from Josh and Zydeca of threat actors they are tracking based in Russia and Iran<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://twitter.com/ChicagoCyber/status/1521492543707430912' rel='noopener'>https://twitter.com/ChicagoCyber/status/1521492543707430912</a><br/><a href='https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf' rel='noopener'>https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf</a><br/><a href='https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html' rel='noopener'>https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html</a><br/><a href='https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-kidnapping-conspiracy-charges-against-iranian' rel='noopener'>https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-kidnapping-conspiracy-charges-against-iranian</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Joshua Miller and Zydeca Cass, Senior Threat Researchers at Proofpoint, join the show to discuss attribution, specifically APT actor attribution. Joshua and Zydeca dive into their experiences of attribution successes and failures, sharing tales of threat actors impersonating Russian opposition leaders and an Iranian kidnapping plot in New York. As Crista says, the good, the bad and the ugly.<br/>Join us as we discuss:<br/>Understanding the difference between the two types of attribution<br/>How attribution can be used in e-crime versus state-aligned investigation<br/>Stories from Josh and Zydeca of threat actors they are tracking based in Russia and Iran<br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://twitter.com/ChicagoCyber/status/1521492543707430912' rel='noopener'>https://twitter.com/ChicagoCyber/status/1521492543707430912</a><br/><a href='https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf' rel='noopener'>https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf</a><br/><a href='https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html' rel='noopener'>https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html</a><br/><a href='https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-kidnapping-conspiracy-charges-against-iranian' rel='noopener'>https://www.justice.gov/usao-sdny/pr/manhattan-us-attorney-announces-kidnapping-conspiracy-charges-against-iranian</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491666-apt-attribution-trials-and-tribulations-from-the-field.mp3" length="22554396" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ueqvxry61bo6nm5opbx2n9g54hlm?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">18d31410-9c68-41c7-9139-77e33a8a2f95</guid>
    <pubDate>Tue, 26 Jul 2022 17:44:30 -0400</pubDate>
    <itunes:duration>1876</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Dark-Side of Cryptocurrency</itunes:title>
    <title>The Dark-Side of Cryptocurrency</title>
    <itunes:summary><![CDATA[Send us fan mail! In this episode, Jared Peck, Senior Threat Researcher at Proofpoint, explains cryptocurrency and how bad actors are causing trouble with these new decentralized, anonymous currencies. Join us as we discuss: Credential harvesting and phishing Malicious campaigns and extortion Digital money laundering   Resources: https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency https://twitter.com/ChicagoCyber/status/1521492543707430912 https://blog....]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Jared Peck, Senior Threat Researcher at Proofpoint, explains cryptocurrency and how bad actors are causing trouble with these new decentralized, anonymous currencies.<br/>Join us as we discuss:<br/>Credential harvesting and phishing<br/>Malicious campaigns and extortion<br/>Digital money laundering<br/><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency</a><br/><a href='https://twitter.com/ChicagoCyber/status/1521492543707430912' rel='noopener'>https://twitter.com/ChicagoCyber/status/1521492543707430912</a><br/><a href='https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html' rel='noopener'>https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html</a><br/><a href='https://www.proofpoint.com/us/podcasts/threat-digest#113131' rel='noopener'>https://www.proofpoint.com/us/podcasts/threat-digest#113131</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/advance-fee-fraud-emergence-elaborate-crypto-schemes' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/advance-fee-fraud-emergence-elaborate-crypto-schemes</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>In this episode, Jared Peck, Senior Threat Researcher at Proofpoint, explains cryptocurrency and how bad actors are causing trouble with these new decentralized, anonymous currencies.<br/>Join us as we discuss:<br/>Credential harvesting and phishing<br/>Malicious campaigns and extortion<br/>Digital money laundering<br/><br/><br/>Resources:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency</a><br/><a href='https://twitter.com/ChicagoCyber/status/1521492543707430912' rel='noopener'>https://twitter.com/ChicagoCyber/status/1521492543707430912</a><br/><a href='https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html' rel='noopener'>https://blog.talosintelligence.com/2022/01/iranian-apt-muddywater-targets-turkey.html</a><br/><a href='https://www.proofpoint.com/us/podcasts/threat-digest#113131' rel='noopener'>https://www.proofpoint.com/us/podcasts/threat-digest#113131</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/advance-fee-fraud-emergence-elaborate-crypto-schemes' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/advance-fee-fraud-emergence-elaborate-crypto-schemes</a><br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491667-the-dark-side-of-cryptocurrency.mp3" length="25168001" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ccrwiw9r0axx1v3lu0y4s0j270fj?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">9c6d6c72-4d3f-412b-85a0-cf5c535db855</guid>
    <pubDate>Tue, 12 Jul 2022 10:21:17 -0400</pubDate>
    <itunes:duration>2094</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Day in the Life of a Threat Researcher: Emerging Threats Edition</itunes:title>
    <title>A Day in the Life of a Threat Researcher: Emerging Threats Edition</title>
    <itunes:summary><![CDATA[Send us fan mail! Tony Robinson, Threat Researcher, joins the podcast to share his expertise as a member of the Emerging Threats team at Proofpoint. Tony gives us an inside look into a day in his life as he and his teammates discover new strains of malware, respond to major vulnerabilities, and ensure that customers are protected. He also shares his advice for those interested in a career in Threat Research. Join us as we discuss: How the Emerging Threats team at Proofpoint impacts customers ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Tony Robinson, Threat Researcher, joins the podcast to share his expertise as a member of the Emerging Threats team at Proofpoint. Tony gives us an inside look into a day in his life as he and his teammates discover new strains of malware, respond to major vulnerabilities, and ensure that customers are protected. He also shares his advice for those interested in a career in Threat Research.<br/>Join us as we discuss:<br/>How the Emerging Threats team at Proofpoint impacts customers daily lives<br/>Using cybersecurity rule-sets to find new strains of malware<br/>Utilizing the open source security community to write new rules and stay up to date on the developing threat landscape<br/>The difference between rules detecting threat behaviors vs. indicators of compromise <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/products/advanced-threat-protection/et' rel='noopener'>https://www.proofpoint.com/us/products/advanced-threat-protection/et</a>-intelligence <br/><a href='https://twitter.com/da_667/status/1512255056573255693' rel='noopener'>https://twitter.com/da_667/status/1512255056573255693</a><br/><a href='https://twitter.com/da_667/status' rel='noopener'>https://twitter.com/da_667/status</a>/1503876806478385168 <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Tony Robinson, Threat Researcher, joins the podcast to share his expertise as a member of the Emerging Threats team at Proofpoint. Tony gives us an inside look into a day in his life as he and his teammates discover new strains of malware, respond to major vulnerabilities, and ensure that customers are protected. He also shares his advice for those interested in a career in Threat Research.<br/>Join us as we discuss:<br/>How the Emerging Threats team at Proofpoint impacts customers daily lives<br/>Using cybersecurity rule-sets to find new strains of malware<br/>Utilizing the open source security community to write new rules and stay up to date on the developing threat landscape<br/>The difference between rules detecting threat behaviors vs. indicators of compromise <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/products/advanced-threat-protection/et' rel='noopener'>https://www.proofpoint.com/us/products/advanced-threat-protection/et</a>-intelligence <br/><a href='https://twitter.com/da_667/status/1512255056573255693' rel='noopener'>https://twitter.com/da_667/status/1512255056573255693</a><br/><a href='https://twitter.com/da_667/status' rel='noopener'>https://twitter.com/da_667/status</a>/1503876806478385168 <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491668-a-day-in-the-life-of-a-threat-researcher-emerging-threats-edition.mp3" length="24084523" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/g9rqn74psq8bycc51km2ypbm5e5l?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">90f9fefc-2651-48ef-a684-887c1c857a27</guid>
    <pubDate>Tue, 21 Jun 2022 15:24:46 -0400</pubDate>
    <itunes:duration>2004</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Buzz on Bumblebee Malware</itunes:title>
    <title>The Buzz on Bumblebee Malware</title>
    <itunes:summary><![CDATA[Send us fan mail! Float like a butterfly. Sting like Bumblebee malware. In this episode, Kelsey Merriman, Threat Research Analyst, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, share their insights from their research of the new malware downloader called Bumblebee. You won’t want to miss their breakdown of Bumblebee’s unique characteristics and their predictions of how its features will develop over time. Join us as we discuss: The difference in tracking Crimeware versus ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Float like a butterfly. Sting like Bumblebee malware.<br/>In this episode, Kelsey Merriman, Threat Research Analyst, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, share their insights from their research of the new malware downloader called Bumblebee. You won’t want to miss their breakdown of Bumblebee’s unique characteristics and their predictions of how its features will develop over time.<br/>Join us as we discuss:<br/>The difference in tracking Crimeware versus AAPT<br/>How threat actors are using Bumblebee<br/>The exit of BazaLoader malware and its connection to Bumblebee  <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/isnt-optimus-primes-bumblebee-its-still-transforming' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/isnt-optimus-primes-bumblebee-its-still-transforming</a><br/><a href='https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties' rel='noopener'>https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties</a>-conti  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Float like a butterfly. Sting like Bumblebee malware.<br/>In this episode, Kelsey Merriman, Threat Research Analyst, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, share their insights from their research of the new malware downloader called Bumblebee. You won’t want to miss their breakdown of Bumblebee’s unique characteristics and their predictions of how its features will develop over time.<br/>Join us as we discuss:<br/>The difference in tracking Crimeware versus AAPT<br/>How threat actors are using Bumblebee<br/>The exit of BazaLoader malware and its connection to Bumblebee  <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/isnt-optimus-primes-bumblebee-its-still-transforming' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/isnt-optimus-primes-bumblebee-its-still-transforming</a><br/><a href='https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties' rel='noopener'>https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties</a>-conti  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491669-the-buzz-on-bumblebee-malware.mp3" length="21857057" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dnkfbkumc7nwnyjlucvf8950hbt8?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">b05b43b8-f3b7-4ccc-9e7e-1595322d0f1a</guid>
    <pubDate>Tue, 07 Jun 2022 14:15:00 -0400</pubDate>
    <itunes:duration>1818</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Social Engineering: How Threat Actors Manipulate Their Targets</itunes:title>
    <title>Social Engineering: How Threat Actors Manipulate Their Targets</title>
    <itunes:summary><![CDATA[Send us fan mail! Threat actors always take the path of least resistance to their payday. But it's a mistake to think they aren't willing to put in the work to get a human to hand feed them. Their attempts to manipulate their targets into taking action are called social engineering. What role do people play in cybersecurity? In this episode, Daniel Blackford, Threat Researcher at Proofpoint, explains how bad actors capitalize on our humanity to attack us. Join us as we discuss: What lies bene...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Threat actors always take the path of least resistance to their payday. But it&apos;s a mistake to think they aren&apos;t willing to put in the work to get a human to hand feed them.<br/>Their attempts to manipulate their targets into taking action are called social engineering. What role do people play in cybersecurity?<br/>In this episode, Daniel Blackford, Threat Researcher at Proofpoint, explains how bad actors capitalize on our humanity to attack us.<br/>Join us as we discuss:<br/>What lies beneath 95% of cyber attacks<br/>The two factors that reduce people&apos;s sensitivity to threats<br/>When social engineering content might be waiting for you    <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/triple-threat-north-korea-aligned-ta406-scams-spies-and-steal' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/triple-threat-north-korea-aligned-ta406-scams-spies-and-steal</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453</a><br/><a href='https://www.bankinfosecurity.com/kansas-man-faces-federal-charges-over-water-treatment-hack-a-16328' rel='noopener'>https://www.bankinfosecurity.com/kansas-man-faces-federal-charges-over-water-treatment-hack-a-16328</a><br/><a href='https://twitter.com/selenalarson/status' rel='noopener'>https://twitter.com/selenalarson/status</a>/1224674562882834432  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Threat actors always take the path of least resistance to their payday. But it&apos;s a mistake to think they aren&apos;t willing to put in the work to get a human to hand feed them.<br/>Their attempts to manipulate their targets into taking action are called social engineering. What role do people play in cybersecurity?<br/>In this episode, Daniel Blackford, Threat Researcher at Proofpoint, explains how bad actors capitalize on our humanity to attack us.<br/>Join us as we discuss:<br/>What lies beneath 95% of cyber attacks<br/>The two factors that reduce people&apos;s sensitivity to threats<br/>When social engineering content might be waiting for you    <br/><br/><br/>Check out these resources we mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/triple-threat-north-korea-aligned-ta406-scams-spies-and-steal' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/triple-threat-north-korea-aligned-ta406-scams-spies-and-steal</a><br/><a href='https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/operation-spoofedscholars-conversation-ta453</a><br/><a href='https://www.bankinfosecurity.com/kansas-man-faces-federal-charges-over-water-treatment-hack-a-16328' rel='noopener'>https://www.bankinfosecurity.com/kansas-man-faces-federal-charges-over-water-treatment-hack-a-16328</a><br/><a href='https://twitter.com/selenalarson/status' rel='noopener'>https://twitter.com/selenalarson/status</a>/1224674562882834432  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491670-social-engineering-how-threat-actors-manipulate-their-targets.mp3" length="22939988" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/9ugfgh1ho8388js48e454gms91tm?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">0a4f5a46-8dfa-4c5b-8544-c1dd50e8fbfe</guid>
    <pubDate>Tue, 24 May 2022 17:15:00 -0400</pubDate>
    <itunes:duration>1908</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Paying Attention to BEC: The Most Costly Threat by Individual Losses</itunes:title>
    <title>Paying Attention to BEC: The Most Costly Threat by Individual Losses</title>
    <itunes:summary><![CDATA[Send us fan mail! When you think about the most costly threat by personal losses, most people will assume ransomware. The real threat, however, is business email compromise (BEC). But why aren’t more companies talking about it, then? In this episode, Tim Kromphardt and Jake G. explain BEC and why organizations need to start paying more attention. Join us as we discuss: The definition of BEC &amp; why companies are paying so little attention Using Supernova to defend against email attacks Repo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>When you think about the most costly threat by personal losses, most people will assume ransomware.<br/>The real threat, however, is business email compromise (BEC). But why aren’t more companies talking about it, then?<br/>In this episode, Tim Kromphardt and Jake G. explain BEC and why organizations need to start paying more attention.<br/>Join us as we discuss:<br/>The definition of BEC &amp; why companies are paying so little attention<br/>Using Supernova to defend against email attacks<br/>Reporting on employment fraud   <br/><br/><br/>Check out these resources we mentioned:<br/>BEC Taxonomy: <a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework</a><br/>Supernova: <a href='https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and' rel='noopener'>https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and</a><br/>IC3 Report: <a href='https://www.ic3.gov/' rel='noopener'>https://www.ic3.gov/</a><br/>TOAD blog post: <a href='https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery</a><br/>Railroad theft: <a href='https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index' rel='noopener'>https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index</a>.html  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>When you think about the most costly threat by personal losses, most people will assume ransomware.<br/>The real threat, however, is business email compromise (BEC). But why aren’t more companies talking about it, then?<br/>In this episode, Tim Kromphardt and Jake G. explain BEC and why organizations need to start paying more attention.<br/>Join us as we discuss:<br/>The definition of BEC &amp; why companies are paying so little attention<br/>Using Supernova to defend against email attacks<br/>Reporting on employment fraud   <br/><br/><br/>Check out these resources we mentioned:<br/>BEC Taxonomy: <a href='https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/bec-taxonomy-proofpoint-framework</a><br/>Supernova: <a href='https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and' rel='noopener'>https://www.proofpoint.com/us/newsroom/press-releases/proofpoint-launches-industrys-first-cloud-native-information-protection-and</a><br/>IC3 Report: <a href='https://www.ic3.gov/' rel='noopener'>https://www.ic3.gov/</a><br/>TOAD blog post: <a href='https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/caught-beneath-landline-411-telephone-oriented-attack-delivery</a><br/>Railroad theft: <a href='https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index' rel='noopener'>https://www.cnn.com/2022/01/14/economy/la-freight-railroad-theft/index</a>.html  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491671-paying-attention-to-bec-the-most-costly-threat-by-individual-losses.mp3" length="28112955" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/izry9ui4wz3jaxnzdnqj9om6519p?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">ba9599ef-e36f-4ec7-aaf8-28688a317630</guid>
    <pubDate>Tue, 10 May 2022 14:00:00 -0400</pubDate>
    <itunes:duration>2340</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Web Bugs &amp; the Tubthumping Tactics of Chinese Threat Actor TA416</itunes:title>
    <title>Web Bugs &amp; the Tubthumping Tactics of Chinese Threat Actor TA416</title>
    <itunes:summary><![CDATA[Send us fan mail! Chinese Threat Actor TA416, otherwise known as Mustang Panda, has been active for a long time, and every time they get knocked down, they get up again.  In this episode, Michael Raggi, Senior Threat Researcher, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, give us an overview of TA416 — the “Tubthumping” villains of the threat landscape.  Join us as we discuss: The evolving tactics of TA416 PlugX malware and control flow flattening Tips for dea...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Chinese Threat Actor TA416, otherwise known as Mustang Panda, has been active for a long time, and every time they get knocked down, they get up again. <br/>In this episode, Michael Raggi, Senior Threat Researcher, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, give us an overview of TA416 — the “Tubthumping” villains of the threat landscape. <br/>Join us as we discuss:<br/>The evolving tactics of TA416<br/>PlugX malware and control flow flattening<br/>Tips for dealing with emerging threats <br/><br/><br/>Check out these resources we mentioned:<br/>Michael’s Twitter: <a href='https://twitter.com/aRtAGGI/status' rel='noopener'>https://twitter.com/aRtAGGI/status</a>/1501030779480125441 <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european</a><br/><a href='https://www.theregister.com/2022/03/09/china_apt41_mandiant_usaherds' rel='noopener'>https://www.theregister.com/2022/03/09/china_apt41_mandiant_usaherds</a>/ <br/>Tubthumping by Chumbawamba  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Chinese Threat Actor TA416, otherwise known as Mustang Panda, has been active for a long time, and every time they get knocked down, they get up again. <br/>In this episode, Michael Raggi, Senior Threat Researcher, and Pim Trouerbach, Senior Reverse Engineer, both with Proofpoint, give us an overview of TA416 — the “Tubthumping” villains of the threat landscape. <br/>Join us as we discuss:<br/>The evolving tactics of TA416<br/>PlugX malware and control flow flattening<br/>Tips for dealing with emerging threats <br/><br/><br/>Check out these resources we mentioned:<br/>Michael’s Twitter: <a href='https://twitter.com/aRtAGGI/status' rel='noopener'>https://twitter.com/aRtAGGI/status</a>/1501030779480125441 <br/><a href='https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/good-bad-and-web-bug-ta416-increases-operational-tempo-against-european</a><br/><a href='https://www.theregister.com/2022/03/09/china_apt41_mandiant_usaherds' rel='noopener'>https://www.theregister.com/2022/03/09/china_apt41_mandiant_usaherds</a>/ <br/>Tubthumping by Chumbawamba  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491672-web-bugs-the-tubthumping-tactics-of-chinese-threat-actor-ta416.mp3" length="26031510" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/wgij306hw3tknl1nwyo6himut7ar?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">60d9870c-aa2c-4b77-b03f-7bebe01c1e58</guid>
    <pubDate>Tue, 26 Apr 2022 02:00:00 -0400</pubDate>
    <itunes:duration>2167</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Defending Against Cyber Criminals: Emotet’s Resurrection &amp; Conti’s Implosion</itunes:title>
    <title>Defending Against Cyber Criminals: Emotet’s Resurrection &amp; Conti’s Implosion</title>
    <itunes:summary><![CDATA[Send us fan mail! Cybercriminals. They’re just like us.  With the Russia Ukraine conflict, Conti found itself at odds with internal team members over the issue — Eventually leading to self destruction. Which begs the question: Are these organizations as impenetrable as we thought?  In this episode, we hear from Andrew Northern, Senior Threat Researcher at Proofpoint, about the resurrection of the Emotet malware, the Conti implosion, and advice to cyber defenders.  Join us as we...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cybercriminals. They’re just like us. <br/>With the Russia Ukraine conflict, Conti found itself at odds with internal team members over the issue — Eventually leading to self destruction.<br/>Which begs the question: Are these organizations as impenetrable as we thought? <br/>In this episode, we hear from Andrew Northern, Senior Threat Researcher at Proofpoint, about the resurrection of the Emotet malware, the Conti implosion, and advice to cyber defenders. <br/>Join us as we discuss:<br/>The journey leading to Emotet’s return<br/>The importance of the Conti group leaks<br/>What defenders should be thinking about against cyber threats  <br/><br/><br/>Check out this resource we mentioned:<br/>Andrew&apos;s Twitter: <a href='https://mobile.twitter.com/ex' rel='noopener'>https://mobile.twitter.com/ex</a>_raritas <br/><a href='https://acn-marketing-blog.accenture.com/wp-content/uploads/2022/03/UPDATED-ACTI-Global-Incident-Report-Ideological-Divide-Blog-14MARCH22' rel='noopener'>https://acn-marketing-blog.accenture.com/wp-content/uploads/2022/03/UPDATED-ACTI-Global-Incident-Report-Ideological-Divide-Blog-14MARCH22</a>.pdf <br/><a href='https://www.wired.com/story/conti-ransomware-russia/' rel='noopener'>https://www.wired.com/story/conti-ransomware-russia/</a><br/><a href='https://www.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang/index.html' rel='noopener'>https://www.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang/index.html</a>   <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Cybercriminals. They’re just like us. <br/>With the Russia Ukraine conflict, Conti found itself at odds with internal team members over the issue — Eventually leading to self destruction.<br/>Which begs the question: Are these organizations as impenetrable as we thought? <br/>In this episode, we hear from Andrew Northern, Senior Threat Researcher at Proofpoint, about the resurrection of the Emotet malware, the Conti implosion, and advice to cyber defenders. <br/>Join us as we discuss:<br/>The journey leading to Emotet’s return<br/>The importance of the Conti group leaks<br/>What defenders should be thinking about against cyber threats  <br/><br/><br/>Check out this resource we mentioned:<br/>Andrew&apos;s Twitter: <a href='https://mobile.twitter.com/ex' rel='noopener'>https://mobile.twitter.com/ex</a>_raritas <br/><a href='https://acn-marketing-blog.accenture.com/wp-content/uploads/2022/03/UPDATED-ACTI-Global-Incident-Report-Ideological-Divide-Blog-14MARCH22' rel='noopener'>https://acn-marketing-blog.accenture.com/wp-content/uploads/2022/03/UPDATED-ACTI-Global-Incident-Report-Ideological-Divide-Blog-14MARCH22</a>.pdf <br/><a href='https://www.wired.com/story/conti-ransomware-russia/' rel='noopener'>https://www.wired.com/story/conti-ransomware-russia/</a><br/><a href='https://www.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang/index.html' rel='noopener'>https://www.cnn.com/2022/03/30/politics/ukraine-hack-russian-ransomware-gang/index.html</a>   <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491673-defending-against-cyber-criminals-emotet-s-resurrection-conti-s-implosion.mp3" length="19858698" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j2vopfpkf35mmjn5ywit2brh1rba?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">18fcd04d-35c8-4cd9-9cc3-e1435531da09</guid>
    <pubDate>Tue, 12 Apr 2022 04:30:00 -0400</pubDate>
    <itunes:duration>1652</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat Actor 2541: The Latest Tricks &amp; Patterns</itunes:title>
    <title>Threat Actor 2541: The Latest Tricks &amp; Patterns</title>
    <itunes:summary><![CDATA[Send us fan mail! How are threat actors like Olympic snowboard halfpipe athletes? When their good tricks get stolen by competitors, they add new ones to their repertoire. In this episode, we hear from Joe Wise, Threat Researcher at Proofpoint, about the latest tricks from TA2541 (and why it’s so fun to research that group). Join us as we discuss: Changes that TA2541 has made over time Their current strategies and patterns Snowboarding, Home Alone, and what makes TA2541 unique     Ch...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How are threat actors like Olympic snowboard halfpipe athletes?<br/>When their good tricks get stolen by competitors, they add new ones to their repertoire.<br/>In this episode, we hear from Joe Wise, Threat Researcher at Proofpoint, about the latest tricks from TA2541 (and why it’s so fun to research that group).<br/>Join us as we discuss:<br/>Changes that TA2541 has made over time<br/>Their current strategies and patterns<br/>Snowboarding, Home Alone, and what makes TA2541 unique  <br/><br/><br/>Check out this resource we mentioned:<br/>Charting TA2541&apos;s Flight | Proofpoint US <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>How are threat actors like Olympic snowboard halfpipe athletes?<br/>When their good tricks get stolen by competitors, they add new ones to their repertoire.<br/>In this episode, we hear from Joe Wise, Threat Researcher at Proofpoint, about the latest tricks from TA2541 (and why it’s so fun to research that group).<br/>Join us as we discuss:<br/>Changes that TA2541 has made over time<br/>Their current strategies and patterns<br/>Snowboarding, Home Alone, and what makes TA2541 unique  <br/><br/><br/>Check out this resource we mentioned:<br/>Charting TA2541&apos;s Flight | Proofpoint US <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491674-threat-actor-2541-the-latest-tricks-patterns.mp3" length="16922999" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mc1nghijbm3arpvy6k7gvo4fz6v7?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">6f595e63-3e1e-4105-a072-b3119f1e2713</guid>
    <pubDate>Tue, 29 Mar 2022 06:00:00 -0400</pubDate>
    <itunes:duration>1407</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Troubling Rise of MFA Kits</itunes:title>
    <title>The Troubling Rise of MFA Kits</title>
    <itunes:summary><![CDATA[Send us fan mail! Until recently, threat actors haven’t really invested much time in MFA phish kits because not a lot of people used MFA. (Everyone needs MFA, full stop.) Consequently, threat actors are using more advanced multi-factor authentication-enabled phish kits. Find out why in our first episode of DISCARDED, where we hear from Tim Kromphardt, Email Threat Researcher at Proofpoint, about why MFA kits are sort of like Justin Bieber ticket thieves. Join us as we discuss: How MFA kits di...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Until recently, threat actors haven’t really invested much time in MFA phish kits because not a lot of people used MFA. (Everyone needs MFA, full stop.)<br/>Consequently, threat actors are using more advanced multi-factor authentication-enabled phish kits.<br/>Find out why in our first episode of DISCARDED, where we hear from Tim Kromphardt, Email Threat Researcher at Proofpoint, about why MFA kits are sort of like Justin Bieber ticket thieves.<br/>Join us as we discuss:<br/>How MFA kits differ from ordinary phish kits<br/>What threat actors and researchers have in common<br/>A technical dive into transparent reverse proxies<br/>Why you need multifactor authentication despite the rise of MFA kits  <br/><br/><br/>Check out these resources we mentioned during the podcast:<br/>MFA PSA, Oh My!<br/>Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>Until recently, threat actors haven’t really invested much time in MFA phish kits because not a lot of people used MFA. (Everyone needs MFA, full stop.)<br/>Consequently, threat actors are using more advanced multi-factor authentication-enabled phish kits.<br/>Find out why in our first episode of DISCARDED, where we hear from Tim Kromphardt, Email Threat Researcher at Proofpoint, about why MFA kits are sort of like Justin Bieber ticket thieves.<br/>Join us as we discuss:<br/>How MFA kits differ from ordinary phish kits<br/>What threat actors and researchers have in common<br/>A technical dive into transparent reverse proxies<br/>Why you need multifactor authentication despite the rise of MFA kits  <br/><br/><br/>Check out these resources we mentioned during the podcast:<br/>MFA PSA, Oh My!<br/>Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits  <br/><br/><br/>Keep up with the latest tales from the threat research trenches by subscribing to DISCARDED in Apple Podcasts, Spotify, or wherever you get podcasts. Thanks for listening!]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491675-the-troubling-rise-of-mfa-kits.mp3" length="21143203" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/690phmrx1ia3khi0cgyencd40dk8?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">ee87c967-1a4c-4ac0-8689-b7d5abcf6e02</guid>
    <pubDate>Tue, 15 Mar 2022 18:53:41 -0400</pubDate>
    <itunes:duration>1759</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Discussing RTF Template Injection: A Malicious Phishing Attempt</itunes:title>
    <title>Discussing RTF Template Injection: A Malicious Phishing Attempt</title>
    <itunes:summary><![CDATA[Send us fan mail! If you asked for M&amp;M’s and received Skittles, you might pop a few in your mouth, but it won’t take long to realize something’s off. This is exactly what’s happening with RTF files: Instead of the intended attachment, unaware companies are delivering these files and realizing later that they were actually malicious. On this episode of Protecting People, hosts Selena Larson and Crista Giering chat with Michael Raggi, Senior Threat Research Engineer at Proofpoint, about RTF...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>If you asked for M&amp;M’s and received Skittles, you might pop a few in your mouth, but it won’t take long to realize something’s off.<br/>This is exactly what’s happening with RTF files: Instead of the intended attachment, unaware companies are delivering these files and realizing later that they were actually malicious.<br/>On this episode of Protecting People, hosts Selena Larson and Crista Giering chat with Michael Raggi, Senior Threat Research Engineer at Proofpoint, about RTF files, template injection, and campaigns using the technique in an effort to make sure customers aren’t being surprised with “Skittles.”<br/>Join us as we discuss:<br/>The importance of template injection<br/>Campaigns using the technique<br/>Widespread adoption of the RTF injection<br/>Mitigating and monitoring the technique<br/><br/><br/>Resource mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread</a><br/><br/><br/>For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/2445401/fan_mail/new">Send us fan mail!</a></p>If you asked for M&amp;M’s and received Skittles, you might pop a few in your mouth, but it won’t take long to realize something’s off.<br/>This is exactly what’s happening with RTF files: Instead of the intended attachment, unaware companies are delivering these files and realizing later that they were actually malicious.<br/>On this episode of Protecting People, hosts Selena Larson and Crista Giering chat with Michael Raggi, Senior Threat Research Engineer at Proofpoint, about RTF files, template injection, and campaigns using the technique in an effort to make sure customers aren’t being surprised with “Skittles.”<br/>Join us as we discuss:<br/>The importance of template injection<br/>Campaigns using the technique<br/>Widespread adoption of the RTF injection<br/>Mitigating and monitoring the technique<br/><br/><br/>Resource mentioned:<br/><a href='https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread' rel='noopener'>https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread</a><br/><br/><br/>For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for Protecting People in your favorite podcast player.]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2445401/episodes/16491676-discussing-rtf-template-injection-a-malicious-phishing-attempt.mp3" length="18654918" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/woljr1s2kvmalma0hoox56wimh2e?.jpg" />
    <itunes:author>Proofpoint</itunes:author>
    <guid isPermaLink="false">c7df841a-1f53-4e4a-ab62-9cc5337c4d42</guid>
    <pubDate>Wed, 02 Mar 2022 14:07:00 -0500</pubDate>
    <itunes:duration>1551</itunes:duration>
    <itunes:keywords>template injection</itunes:keywords>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType></itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
