• Microsoft Threat Intelligence Podcast

  • Auteur(s): Microsoft
  • Podcast

Microsoft Threat Intelligence Podcast

Auteur(s): Microsoft
  • Résumé

  • Join us to hear stories from the Microsoft Threat Intelligence community as they navigate the ever-evolving threat landscape - uncovering APTs, cybercrime gangs, malware, vulnerabilities, and other weird and cool tools and tactics in the world of cyber threats. Featuring tales of innovation, teamwork, and cyber espionage, tune in to hear in-depth analyses of Microsoft's influence on the threat landscape and behind the scenes stories from the tireless researchers and analysts that take part. This enthralling and insightful podcast is delivered in a casual, conversational style that transports you to the frontlines of cyber defense.
    ©2023 Microsoft
    Voir plus Voir moins
Épisodes
  • A Blizzard Is Impacting NATO and Ukraine – The Latest on Russian Cyber Threats
    Feb 19 2025
    In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by two Microsoft security researchers to analyze the latest Russian nation-sponsored cyber threat activity. They discuss how Russian threat actors—collectively referred to by Microsoft with the Blizzard suffix—are primarily targeting Ukraine and NATO member states, focusing on espionage, influence operations, and cyber disruption. The conversation covers Russia’s reliance on cybercrime infrastructure, the vulnerabilities of academic and IT supply chains, and the evolving tactics of groups like Secret Blizzard and Seashell Blizzard. In this episode you’ll learn: Why 90% of Russian cyber-attacks target Ukraine and NATO member states How Russian threat actors exploit academic identities to infiltrate government networks The role of cybercriminal marketplaces in supplying tools and access to nation-state actors Some questions we ask: How does Secret Blizzard leverage infrastructure from other threat groups? Is there evidence of collaboration between different Russian cyber groups? Why is identity security such a critical factor in cyber defense? Resources: Attending RSAC? Connect with Sherrod and Microsoft View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
    Voir plus Voir moins
    23 min
  • Microsoft’s CVP of Fraud on Combating Ecosystem Abuse
    Feb 5 2025
    In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by two expert guests to explore critical challenges in today’s evolving threat landscape. First, Sherrod sits down with Kelly Bissell, CVP of Fraud at Microsoft, to discuss the complexities of combating fraud and product abuse. Kelly digs into the unique challenges Microsoft faces, highlighting prevalent schemes such as crypto mining, tech support scams, and the exploitation of deepfakes. Kelly also shares insights into Microsoft’s proactive approach, including recent Azure policy changes and efforts to detect and prevent fraud across its services, especially those attempting to use the compute power for crypto mining. Later, Sherrod is joined by Priyanka Ramesha, Senior Threat Researcher on the Defender Experts team, to examine the rising risks of cloud-native attacks. They unpack why threat actors are increasingly targeting the cloud, exploiting its complexity, scalability, and common misconfigurations. Priyanka explains how attackers gain initial access through tactics like phishing, API exploitation, and OAuth abuse, and outlines their methods for credential theft, lateral movement, and data exfiltration. In this episode you’ll learn: What crypto mining looks like in Azure and how Microsoft detects and prevents it The five main areas of fraud and product abuse that Microsoft focuses on How attackers exploit the complexity and misconfigurations in cloud infrastructures Some questions we ask: How long do crypto mining operations run unnoticed in a customer's environment? What changes did Microsoft make to its policy regarding crypto mining? Why are legitimate apps sometimes compromised and used in attacks? Resources: View Kelly Bissell on LinkedIn View Priyanka Ramesha on LinkedIn View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
    Voir plus Voir moins
    51 min
  • Seashell Blizzard Ramping Up Operations and OSINT Trends of DPRK Threat Actors
    Jan 22 2025
    In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Elise Eldridge and Anna Seitz to discuss the most recent notable developments across the threat landscape. The threat actor, also known as Sandworm or APT44, has also been observed resuming the use of the wrappers WalnutWipe and SharpWipe, and expanded the use of the Prickly Pear malware downloader. The team highlights the geopolitical implications of these attacks, particularly in the context of Russia's influence on energy and global events. Sherrod also touches on the history of wipers in cyber operations and transitions to a discussion with Elise about trends in North Korean cyber activity, emphasizing Microsoft's ongoing efforts to analyze and mitigate these threats. In this episode you’ll learn: Why recent attacks have targeted the European energy sector How Seashell Blizzard’s attacks in 2024 involved spear-phishing campaigns Why North Korean hackers infiltrate companies through remote IT job programs Some questions we ask: How has Seashell Blizzard returned to using wipers, and what might explain this shift? After sending out crafted spear-phishing emails, what happens next in the attack chain? How might global geopolitics impact Seashell Blizzard's campaigns? Resources: View Elise Eldridge LinkedIn View Anna Seitz on LinkedIn View Sherrod DeGrippo on LinkedIn Related Microsoft Podcasts: Afternoon Cyber Tea with Ann Johnson The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Get the latest threat intelligence insights and guidance at Microsoft Security Insider The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
    Voir plus Voir moins
    26 min

Ce que les auditeurs disent de Microsoft Threat Intelligence Podcast

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.