thecyberwire.com
Open in
urlscan Pro
2600:9000:2127:a000:a:f21e:800:93a1
Public Scan
URL:
https://thecyberwire.com/podcasts/microsoft-threat-intelligence
Submission: On January 04 via api from BY — Scanned from DE
Submission: On January 04 via api from BY — Scanned from DE
Form analysis
2 forms found in the DOM<form class="search__form" action="" role="search"><input type="search" name="searchinput" placeholder="Enter search query..." maxlength="512" autocapitalize="off" spellcheck="false" class="search__input" value="">
<div class="search-icon-enter"><svg class="search-icon" width="20px" height="20px" viewBox="0 0 100 100">
<title>Search the site</title>
<path d="M80.65 66.78a33.55 33.55 0 0 1-47.44-47.44 33.55 33.55 0 1 1 47.44 47.44zm6.73-54.16a43.06 43.06 0 0 0-65.32 55.71L2 88.39A6.8 6.8 0 0 0 11.61 98l20.06-20.06a43.06 43.06 0 0 0 55.71-65.32z"></path>
</svg></div>
<div class="search-icon-close"><svg width="24px" height="24px" viewBox="0 0 24 24">
<path d="M19 6.4l-1.4-1.4-5.6 5.6-5.6-5.6-1.4 1.4 5.6 5.6-5.6 5.6 1.4 1.4 5.6-5.6 5.6 5.6 1.4-1.4-5.6-5.6z"></path>
</svg></div>
</form>
<form class="search__form" action="" role="search"><input type="search" name="searchinput" placeholder="Enter search query..." maxlength="512" autocapitalize="off" spellcheck="false" class="search__input" value="">
<div class="search-icon-enter"><svg class="search-icon" width="20px" height="20px" viewBox="0 0 100 100">
<title>Search the site</title>
<path d="M80.65 66.78a33.55 33.55 0 0 1-47.44-47.44 33.55 33.55 0 1 1 47.44 47.44zm6.73-54.16a43.06 43.06 0 0 0-65.32 55.71L2 88.39A6.8 6.8 0 0 0 11.61 98l20.06-20.06a43.06 43.06 0 0 0 55.71-65.32z"></path>
</svg></div>
<div class="search-icon-close"><svg width="24px" height="24px" viewBox="0 0 24 24">
<path d="M19 6.4l-1.4-1.4-5.6 5.6-5.6-5.6-1.4 1.4 5.6 5.6-5.6 5.6 1.4 1.4 5.6-5.6 5.6 5.6 1.4-1.4-5.6-5.6z"></path>
</svg></div>
</form>
Text Content
× This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Cookies settings Accept All Decline All Stories Podcasts Briefings Pro * Pro Briefings * Pro Podcasts * CSO Perspectives * Analyst Call * 1st Principles Course * Hash Table * API * Features/Pricing Events Glossary About * Our Story * Press * Team * Testimonials * Sponsor * Partners Join Pro Search the site Search the site Login Podcasts Search the site Search the site Stories Podcasts Briefings Pro Pro Briefings Pro Podcasts CSO Perspectives Analyst Call 1st Principles Course Hash Table API Features/Pricing Events Glossary About Our Story Press Team Testimonials Sponsor Partners Pro Briefings Pro Podcasts CSO Perspectives Features/Pricing January 4, 2024 Join Pro LOGIN Podcasts The Microsoft Threat Intelligence Podcast THE MICROSOFT THREAT INTELLIGENCE PODCAST Join us to hear stories from the Microsoft Threat Intelligence community as they navigate the ever-evolving threat landscape - uncovering APTs, cybercrime gangs, malware, vulnerabilities, and other weird and cool tools and tactics in the world of cyber threats. Featuring tales of innovation, teamwork, and cyber espionage, tune in to hear in-depth analyses of Microsoft's influence on the threat landscape and behind the scenes stories from the tireless researchers and analysts that take part. This enthralling and insightful podcast is delivered in a casual, conversational style that transports you to the frontlines of cyber defense. Subscribe Apple Podcasts Apple Podcasts Google Podcasts Overcast Overcast Spotify Amazon Music RSS TRAILER RECENT EPISODES Ep 8 | 12.13.23 A Journey through Cyberwarcon On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Judy Ng, Mark Parsons, and Ned Moran. Together, they delve into the riveting world of Cyberwarcon, exploring the activities of threat actors such as Volt Typhoon from China and Iranian-based adversaries. Sherrod sheds light on Volt Typhoon's strategic targeting of critical infrastructure while the team elaborates on the Iranian actors' reactive and opportunistic approach to current cyber attacks. The episode unfolds with insightful discussions of sophisticated techniques like "living off the land" and the intricacies of information operations while providing a deep dive into the evolving landscape of cyber threats and intelligence. Transcript Ep 7 | 11.29.23 Threat Landscape with Wes Drone On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft Threat Research and Intelligence Leader Wes Drone. Wes has spent five years investigating criminal and national security computer intrusions for the FBI Cyber Division. After the FBI, he helped a Fortune 25 healthcare organization mature its security operations while gaining first-hand experience in risk management. Sherrod and Wes discuss his current role at Microsoft, where he focuses on messaging and web research. They also touch on the evolving landscape of phishing attacks and the impact of ChatGPT on code writing and security. Transcript Ep 6 | 11.15.23 Punching Miscreants with Jack Mott On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Jack Mott to discuss the movie "Heat" and its relevance to social engineering and threat actor psychology. They also chat about the challenges of identifying real threats in the world of information security, highlighting the need for vigilance in detecting both evident and subtle threats. The conversation revolves around the complexities of distinguishing between genuine and malicious activity and the importance of a nuanced approach to cybersecurity. Ep 5 | 11.1.23 Octo Tempest Threat Actor Profile On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft threat research experts to talk about the activities of a threat actor known as Octo Tempest (which overlaps with research associated with 0ktapus, Scattered Spider, and UNC3944) and the blog released by Microsoft threat intelligence and Microsoft incident response groups. The discussion covers various tactics, techniques, and procedures Octo Tempest employs, such as SIM swapping, SMS phishing, and living off the land rather than using traditional malware. Octo Tempest is portrayed as a highly bespoke and hands-on threat actor, often engaged in "keyboard-to-keyboard combat" and showing extreme persistence even after being detected. Transcript Ep 4 | 10.25.23 China Threat Landscape: Meet the Typhoon On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Microsoft Senior Security Researcher Graham Dietz. Graham provides intelligence-led recommendations to improve cybersecurity posture in the future. They are creating customer-ready reports and presentations incorporating threat actor attribution, threat detection and hunting guidance, and remediation recommendations. Sherrod and Graham discuss China's extensive history in cyber operations, targeting domestic and international entities, including diplomatic organizations and industrial espionage. Transcript Load More Host(s) Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, is a frequently cited threat intelligence expert with a 19-year career leading global threat research and analyst teams. She was named Cybersecurity Woman of the Year in 2022 and Cybersecurity PR Spokesperson of the Year for 2021. Sherrod has provided expert commentary for BBC News, Wall Street Journal, CNN, and New York Times and has presented extensively at conferences including Black Hat, RSA Conference, RMISC, SleuthCon, and others. Follow Sherrod DeGrippo Schedule: Bi-Weekly Credits: Executive Producer is Bruce Bracken, Producer is Rob Petrillo, Production Manager is Max Solomon, and our Audio Engineer (and magician) is none other than The Great Rich Cerbini. Social Media: * Microsoft Threat Intelligence @MsftSecIntel * Microsoft Threat Intelligence Creator: Microsoft Pro Pro Briefings Pro Podcasts CSO Perspectives Features/Pricing Links Stories Podcasts Briefings Events About Our Story Press Team Testimonials Sponsor Partners Resources Glossary Careers API Privacy Terms Contact Us ©2024 N2K Networks, Inc. All rights reserved. CyberWire® is a registered trademark of N2K Networks, Inc.