Attackers rely on defense evasion to stay hidden, but mistakes eventually expose them. In this episode, we analyze areal-world intrusion, break down attacker psychology, and discuss how defenders can proactively detect threats before they achieve their goals. Join us for a deep dive into attacker slip-ups and effective security strategies!
Explore the field of incident response with our hosts as they discuss what it means to be an incident responder. From preparation to recovery, they cover the phases of handling security incidents and the approach needed to remain effective under pressure. Using real-world examples like ransomware attacks, they talk about the challenges, tools, and teamwork involved in reducing impact and learning from each event. This episode provides insight into the essential role of incident responders. Whether you want to know about the tools they use, the choices they make, or their daily tasks, this episode has you covered. Join us to understand why cybersecurity matters for everyone.
In this episode, Bob and Alice take you on an educational journey through malware analysis. They break down key techniques like static and dynamic analysis, memory forensics, and reverse engineering while also addressing advanced challenges such as rootkit detection and anti-analysis techniques. Learn how malware operates, the tools used to dissect it, and the critical skills every analyst needs to stay ahead.
In this episode, Alice and Bob dive into the world of detection engineering, breaking down what it means and why it’s crucial in cybersecurity. Exploring the detection engineering process, the challenges of creating effective detections, and how automation and behavioral analytics are reshaping the field. Plus, we’ll discuss how detection engineering intersects with threat hunting and offer practical advice for anyone looking to get started in this area of InfoSec.
Sources Referenced:
In this episode, Bob and Alice dive into the world of threat hunting, uncovering what it means to take a proactive approach against cyber threats. They explore the day-to-day life of a threat hunter, the step-by-step methodologies used to track hidden adversaries, and the key metrics that measure success. From building hypotheses to emulating attacker techniques, this episode offers insights into the skills and mindset needed to master the hunt and stay ahead of evolving threats.
Sources Referenced:
Join Bob and Alice in this episode of InfoSec Deep Dive as they explore the exciting world of cybersecurity careers. From ethical hackers to forensic analysts, security engineers to GRC strategists, they break down diverse career paths and the skills you need to succeed.
Discover how to gain hands-on experience, overcome challenges like imposter syndrome, and stay ahead in this ever-evolving field. Packed with insights, resources, and practical advice, this episode is your roadmap to thriving in InfoSec!
Sources Referenced:
Join Bob and Alice on the Sigma Podcast as they dive into the world of Sigma rules! Perfect for beginners and pros alike, they break down what Sigma is, why it’s essential and how it’s revolutionizing threat detection.
🔗Sigma Website: sigmahq.io
🔗Sigma Github: https://github.com/SigmaHQ/sigma
Are you confident in your EDR's visibility? This episode explores the EDR Telemetry Project's findings, highlighting critical gaps in telemetry coverage, particularly on Linux systems. We’ll discuss the project’s expansion to Linux, the challenges of diverse Linux environments, and key areas where EDR solutions often fall short, such as kernel-level monitoring, user activity, and service/scheduled task tracking. Discover how the project is pushing vendors to improve and how you can contribute to this effort!
🔗 Website: edr-telemetry.com