Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04
Autonomous IT17 Heinä 2025

Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04

In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in.

Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider. An attacker logs in, flies under the radar, and impersonates internal IT support using Slack, email, and calendar invites. Their goal? Convince employees to install a fake remote access tool—all while avoiding anyone likely to report suspicious behavior.

Join Landon Miles, Tom Bowyer, and Ryan Braunstein as they:

  • 🔍 Investigate a suspicious login and Slack impersonation
  • 🔐 Contain and remediate the breach using real-world tactics and tools
  • 📉 Discuss phishing-resistant MFA, endpoint visibility, Slack impersonation risks, and more
  • 🧠 Share tips on improving security awareness, incident playbooks, and interdepartmental collaboration
  • 💬 Answer live audience questions about malware analysis, EDR response, and building detection rules

Whether you’re a security veteran or just starting out in IT, this episode offers an unfiltered look at how to respond when credentials are compromised and attackers act like insiders.

📎 Bonus: We also include a downloadable Incident Response Checklist to help your team run your own tabletop exercise.

🛡️ Because in today’s world, attackers don’t need to break in—they just need to log in.

Jaksot(212)

Behind the Ticket – What to Do When Both Tools Are Right, E01

Behind the Ticket – What to Do When Both Tools Are Right, E01

A routine support ticket reveals a deeper truth about patch management. Your patching tool says "done," but your vulnerability scanner disagrees – so who's right? In this episode, Automox SVP of Custo...

18 Maalis 7min

Patch [FIX] Tuesday – March 2026 [SMB Is Back and ASLR Gets Shuffled], E29

Patch [FIX] Tuesday – March 2026 [SMB Is Back and ASLR Gets Shuffled], E29

March 2026's Patch Tuesday brings no active exploitations, but don't let that fool you. This month, Ryan Braunstein and Henry Smith break down why medium-severity vulnerabilities deserve your full att...

10 Maalis 21min

Automate IT – The Server Tango: Step In... and Now MySQL's Down, E14

Automate IT – The Server Tango: Step In... and Now MySQL's Down, E14

In this episode, Jeremy Maldonado shares his experiences and insights on server management, highlighting the importance of learning from mistakes, the power of automation, and finding balance between ...

3 Maalis 12min

Automate IT – The Myth of the All-Knowing IT Pro, E22

Automate IT – The Myth of the All-Knowing IT Pro, E22

The all-knowing IT pro is a myth. In this episode, Automox Senior Solutions Consultant Jeremy Maldonado breaks down why curiosity and asking for help are the real foundations of a successful IT career...

26 Helmi 11min

Product Talk – Bridging the CVE Gap with VulnCheck, E24

Product Talk – Bridging the CVE Gap with VulnCheck, E24

NIST is falling behind on vulnerability scoring — and the gap is growing. In this episode, Peter and Steph break down what that means for IT and security teams relying on CVE data to prioritize patchi...

24 Helmi 17min

Secure IT – Why There Are No 'Nos' in IT with Rich Casselberry, E15

Secure IT – Why There Are No 'Nos' in IT with Rich Casselberry, E15

In this episode of Automox's Secure IT podcast, host Jason Kikta welcomes back Rich Casselberry, VP of IT security at AT&I, to discuss key insights from the CISO Blueprint. The conversation emphasizes...

17 Helmi 9min

Patch [FIX] Tuesday – February 2026 [Chaos Engineering], E28

Patch [FIX] Tuesday – February 2026 [Chaos Engineering], E28

February's Patch Tuesday includes two actively exploited vulnerabilities you need to patch now. Ryan Braunstein breaks down a denial of service flaw in Windows Remote Access Connection Manager that ca...

10 Helmi 10min

Automate IT – Beyond the Spreadsheets: Asset Intelligence & Risk Scoring, E16

Automate IT – Beyond the Spreadsheets: Asset Intelligence & Risk Scoring, E16

In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management, breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intel...

5 Helmi 9min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
otetaan-yhdet
rss-vaalirankkurit-podcast
et-sa-noin-voi-sanoo-esittaa
the-ulkopolitist
rss-asiastudio
aihe
rikosmyytit
rss-kaikki-uusiksi
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
viisupodi
rss-hyvaa-huomenta-bryssel
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit
rss-tilannekuva