thecyberwire.com Open in urlscan Pro
2600:9000:2127:a000:a:f21e:800:93a1  Public Scan

URL: https://thecyberwire.com/podcasts/microsoft-threat-intelligence
Submission: On January 04 via api from BY — Scanned from DE

Form analysis 2 forms found in the DOM

<form class="search__form" action="" role="search"><input type="search" name="searchinput" placeholder="Enter search query..." maxlength="512" autocapitalize="off" spellcheck="false" class="search__input" value="">
  <div class="search-icon-enter"><svg class="search-icon" width="20px" height="20px" viewBox="0 0 100 100">
      <title>Search the site</title>
      <path d="M80.65 66.78a33.55 33.55 0 0 1-47.44-47.44 33.55 33.55 0 1 1 47.44 47.44zm6.73-54.16a43.06 43.06 0 0 0-65.32 55.71L2 88.39A6.8 6.8 0 0 0 11.61 98l20.06-20.06a43.06 43.06 0 0 0 55.71-65.32z"></path>
    </svg></div>
  <div class="search-icon-close"><svg width="24px" height="24px" viewBox="0 0 24 24">
      <path d="M19 6.4l-1.4-1.4-5.6 5.6-5.6-5.6-1.4 1.4 5.6 5.6-5.6 5.6 1.4 1.4 5.6-5.6 5.6 5.6 1.4-1.4-5.6-5.6z"></path>
    </svg></div>
</form>

<form class="search__form" action="" role="search"><input type="search" name="searchinput" placeholder="Enter search query..." maxlength="512" autocapitalize="off" spellcheck="false" class="search__input" value="">
  <div class="search-icon-enter"><svg class="search-icon" width="20px" height="20px" viewBox="0 0 100 100">
      <title>Search the site</title>
      <path d="M80.65 66.78a33.55 33.55 0 0 1-47.44-47.44 33.55 33.55 0 1 1 47.44 47.44zm6.73-54.16a43.06 43.06 0 0 0-65.32 55.71L2 88.39A6.8 6.8 0 0 0 11.61 98l20.06-20.06a43.06 43.06 0 0 0 55.71-65.32z"></path>
    </svg></div>
  <div class="search-icon-close"><svg width="24px" height="24px" viewBox="0 0 24 24">
      <path d="M19 6.4l-1.4-1.4-5.6 5.6-5.6-5.6-1.4 1.4 5.6 5.6-5.6 5.6 1.4 1.4 5.6-5.6 5.6 5.6 1.4-1.4-5.6-5.6z"></path>
    </svg></div>
</form>

Text Content

×

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy

If you decline, your information won’t be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

Cookies settings
Accept All Decline All
Stories
Podcasts
Briefings
Pro
 * Pro Briefings
 * Pro Podcasts
 * CSO Perspectives
 * Analyst Call
 * 1st Principles Course
 * Hash Table
 * API
 * Features/Pricing

Events
Glossary
About
 * Our Story
 * Press
 * Team
 * Testimonials
 * Sponsor
 * Partners

Join Pro
Search the site

Search the site
Login
Podcasts
Search the site

Search the site
Stories
Podcasts
Briefings
Pro
Pro Briefings
Pro Podcasts
CSO Perspectives
Analyst Call
1st Principles Course
Hash Table
API
Features/Pricing
Events
Glossary
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
 
Pro Briefings
Pro Podcasts
CSO Perspectives
Features/Pricing
 
January 4, 2024
Join Pro
LOGIN

Podcasts

The Microsoft Threat Intelligence Podcast



THE MICROSOFT THREAT INTELLIGENCE PODCAST

Join us to hear stories from the Microsoft Threat Intelligence community as they
navigate the ever-evolving threat landscape - uncovering APTs, cybercrime gangs,
malware, vulnerabilities, and other weird and cool tools and tactics in the
world of cyber threats. Featuring tales of innovation, teamwork, and cyber
espionage, tune in to hear in-depth analyses of Microsoft's influence on the
threat landscape and behind the scenes stories from the tireless researchers and
analysts that take part. This enthralling and insightful podcast is delivered in
a casual, conversational style that transports you to the frontlines of cyber
defense.
Subscribe
Apple Podcasts
Apple Podcasts
Google Podcasts
Overcast
Overcast
Spotify
Amazon Music
RSS


TRAILER


RECENT EPISODES

Ep 8 | 12.13.23

A Journey through Cyberwarcon



On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod
DeGrippo is joined by Judy Ng, Mark Parsons, and Ned Moran. Together, they delve
into the riveting world of Cyberwarcon, exploring the activities of threat
actors such as Volt Typhoon from China and Iranian-based adversaries. Sherrod
sheds light on Volt Typhoon's strategic targeting of critical infrastructure
while the team elaborates on the Iranian actors' reactive and opportunistic
approach to current cyber attacks. The episode unfolds with insightful
discussions of sophisticated techniques like "living off the land" and the
intricacies of information operations while providing a deep dive into the
evolving landscape of cyber threats and intelligence.

Transcript

Ep 7 | 11.29.23

Threat Landscape with Wes Drone



On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod
DeGrippo is joined by Microsoft Threat Research and Intelligence Leader Wes
Drone. Wes has spent five years investigating criminal and national security
computer intrusions for the FBI Cyber Division. After the FBI, he helped a
Fortune 25 healthcare organization mature its security operations while gaining
first-hand experience in risk management. Sherrod and Wes discuss his current
role at Microsoft, where he focuses on messaging and web research. They also
touch on the evolving landscape of phishing attacks and the impact of ChatGPT on
code writing and security.

Transcript

Ep 6 | 11.15.23

Punching Miscreants with Jack Mott



On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod
DeGrippo is joined by Jack Mott to discuss the movie "Heat" and its relevance to
social engineering and threat actor psychology. They also chat about the
challenges of identifying real threats in the world of information security,
highlighting the need for vigilance in detecting both evident and subtle
threats. The conversation revolves around the complexities of distinguishing
between genuine and malicious activity and the importance of a nuanced approach
to cybersecurity.



Ep 5 | 11.1.23

Octo Tempest Threat Actor Profile



On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod
DeGrippo is joined by Microsoft threat research experts to talk about the
activities of a threat actor known as Octo Tempest (which overlaps with research
associated with 0ktapus, Scattered Spider, and UNC3944) and the blog released by
Microsoft threat intelligence and Microsoft incident response groups. The
discussion covers various tactics, techniques, and procedures Octo Tempest
employs, such as SIM swapping, SMS phishing, and living off the land rather than
using traditional malware. Octo Tempest is portrayed as a highly bespoke and
hands-on threat actor, often engaged in "keyboard-to-keyboard combat" and
showing extreme persistence even after being detected.

Transcript

Ep 4 | 10.25.23

China Threat Landscape: Meet the Typhoon



On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod
DeGrippo is joined by Microsoft Senior Security Researcher Graham Dietz. Graham
provides intelligence-led recommendations to improve cybersecurity posture in
the future. They are creating customer-ready reports and presentations
incorporating threat actor attribution, threat detection and hunting guidance,
and remediation recommendations. Sherrod and Graham discuss China's extensive
history in cyber operations, targeting domestic and international entities,
including diplomatic organizations and industrial espionage.

Transcript
Load More
Host(s)

Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, is a
frequently cited threat intelligence expert with a 19-year career leading global
threat research and analyst teams. She was named Cybersecurity Woman of the Year
in 2022 and Cybersecurity PR Spokesperson of the Year for 2021. Sherrod has
provided expert commentary for BBC News, Wall Street Journal, CNN, and New York
Times and has presented extensively at conferences including Black Hat, RSA
Conference, RMISC, SleuthCon, and others.
Follow Sherrod DeGrippo
Schedule: Bi-Weekly
Credits: Executive Producer is Bruce Bracken, Producer is Rob Petrillo,
Production Manager is Max Solomon, and our Audio Engineer (and magician) is none
other than The Great Rich Cerbini.
Social Media:
 * Microsoft Threat Intelligence  @MsftSecIntel
 * Microsoft Threat Intelligence

Creator: Microsoft



Pro
Pro Briefings
Pro Podcasts
CSO Perspectives
Features/Pricing
Links
Stories
Podcasts
Briefings
Events
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Resources
Glossary
Careers
API

Privacy
Terms
Contact Us

©2024 N2K Networks, Inc. All rights reserved. CyberWire® is a registered
trademark of N2K Networks, Inc.