174 Episoade

  1. UNC5221 and the BRICKSTORM Campaign

    Publicat: 22.10.2025
  2. How vSphere Became a Target for Adversaries

    Publicat: 15.09.2025
  3. AI Tools and Sentiment Within the Underground Cyber Crime Community

    Publicat: 18.08.2025
  4. Protecting the Core: Securing Protection Relays in Modern Substations

    Publicat: 28.07.2025
  5. The Rise of ClickFix

    Publicat: 15.07.2025
  6. Vishing in the Wild

    Publicat: 04.06.2025
  7. Responding to a DPRK ITW Incident

    Publicat: 19.05.2025
  8. UNC5221 and The Targeting of Ivanti Connect Secure VPNs

    Publicat: 05.05.2025
  9. Windows Remote Desktop Protocol: Remote to Rogue

    Publicat: 14.04.2025
  10. Cybersecurity Conversations with the C-Suite and Board

    Publicat: 10.03.2025
  11. What to Watch For in 2025

    Publicat: 28.02.2025
  12. Signals of Trouble

    Publicat: 19.02.2025
  13. Agentic AI in Cybersecurity

    Publicat: 05.02.2025
  14. The Art of Remediation in Incident Response

    Publicat: 02.12.2024
  15. How to Run an Effective Tabletop Exercise

    Publicat: 18.10.2024
  16. Using LLMs to Analyze Windows Binaries

    Publicat: 04.10.2024
  17. How Threat Actors Bypass Multi-Factor Authentication

    Publicat: 26.09.2024
  18. TAG's Work Tracking Commercial Surveillance Vendors

    Publicat: 04.09.2024
  19. What Iranian Threat Actors Have Been Up To This Year

    Publicat: 25.07.2024
  20. Mandiant's Approach to Securely Using AI Solutions

    Publicat: 27.06.2024

1 / 9

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!

Visit the podcast's native language site