
Public pianos and private scams.
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener G...
27 Juni 202439min
![Encore: SOC Triad (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: SOC Triad (noun) [Word Notes]
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
25 Juni 20245min

From dark shadows to main stage.
Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on...
20 Juni 202456min
![Encore: supply chain attacks (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: supply chain attacks (noun) [Word Notes]
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's...
18 Juni 20245min

False flags and fake voices.
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and ...
13 Juni 202440min
![Encore: taint analysis (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Encore: taint analysis (noun) [Word Notes]
The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
11 Juni 20244min

Spotting social engineering in the shadows.
This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intellig...
6 Juni 20241h 1min
![The curious case of the missing IcedID. [Only Malware in the Building]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
The curious case of the missing IcedID. [Only Malware in the Building]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence ...
4 Juni 202421min





















