166 Inside the Adversary Exploit Process

With thousands of vulnerabilities reported and classified each year, it can be challenging to keep track of which exploits are actually being used by threat actors. Researchers with Recorded Future’s Insikt Group have been exploring this issue, and one of their key findings is that less sophisticated threat actors often resort to using older vulnerabilities with easily accessible resources and tutorials.  Greg Lesnewich is a threat intelligence researcher at Recorded Future, and he joins us with insights on the tactics, techniques, and procedures commonly seen from these threat actors, the likely motivation behind them, and what security professionals can do to best protect their networks against them.

2356 232

Suggested Podcasts

Melissa Monte | Mindset Mentor

Amy Connell

EM:RAP

WMU Leadership Center

David Crowther and Wolf O'Neill

Voice of the Victim Podcast