Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/a9/16/3d/a9163d8c-b854-fc04-5d15-e97c988e2a7a/mza_17377144451810740328.jpg/600x600bb.jpg
Detection Engineering Dispatch
Anvilogic
27 episodes
5 days ago
Alex and Scott Rodgers unpack the F5 breach, Mandiant M-Trends highlights like the fall of BEACON, and the leapfrogging of Stolen Creds over Phishing. Expect: The infostealer industrial complexOperation MORPHEUS x BEACON’s quiet exitThe real meaning of “supply chain blast radius” & tight turnaround time reqsWhy screaming might actually save your sanityHit play. Stay unhinged. Detect responsibly. Detection Engineering Dispatch features candid conversations with security teams at top comp...
Show more...
Technology
RSS
All content for Detection Engineering Dispatch is the property of Anvilogic and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Alex and Scott Rodgers unpack the F5 breach, Mandiant M-Trends highlights like the fall of BEACON, and the leapfrogging of Stolen Creds over Phishing. Expect: The infostealer industrial complexOperation MORPHEUS x BEACON’s quiet exitThe real meaning of “supply chain blast radius” & tight turnaround time reqsWhy screaming might actually save your sanityHit play. Stay unhinged. Detect responsibly. Detection Engineering Dispatch features candid conversations with security teams at top comp...
Show more...
Technology
https://storage.buzzsprout.com/a7syxk7e4gwy4b5pua6igc7xhhi5?.jpg
Episode 46: Machine Learning-Powered Threat Hunting ft. Sydney Marrone
Detection Engineering Dispatch
30 minutes
7 months ago
Episode 46: Machine Learning-Powered Threat Hunting ft. Sydney Marrone
Our last drop for International Women's Month featuring Sydney Marrone—Principal Threat Hunter at Splunk and co-author of PEAK Threat Hunting—to explore how ML-driven techniques are transforming detection strategies. Tune in to hear Sydney and Alex break down real-world applications of advanced analytics to surface threats hidden in HTTP datasets. Check out the HEARTH community on their github here: https://github.com/THORCollective/HEARTH If you want to join our sessions live, join ou...
Detection Engineering Dispatch
Alex and Scott Rodgers unpack the F5 breach, Mandiant M-Trends highlights like the fall of BEACON, and the leapfrogging of Stolen Creds over Phishing. Expect: The infostealer industrial complexOperation MORPHEUS x BEACON’s quiet exitThe real meaning of “supply chain blast radius” & tight turnaround time reqsWhy screaming might actually save your sanityHit play. Stay unhinged. Detect responsibly. Detection Engineering Dispatch features candid conversations with security teams at top comp...