Artwork

Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Weird & Wacky Researcher Summer: The Artifacts & Detections Edition

37:15
 
Share
 

Manage episode 367144309 series 3348167
Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
It's shaping up to be a weird and wacky summer for threat researchers.
While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic.

Join us as we discuss the following:

  • Where the team identifies on the Cyber Alignment Chart
  • Use of celebrity names within email lures
  • Recent PDF antics
  • Updates about activity from current threat actors

For more information, check out our website!
  continue reading

63 episodes

Artwork
iconShare
 
Manage episode 367144309 series 3348167
Content provided by Proofpoint. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Proofpoint or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
It's shaping up to be a weird and wacky summer for threat researchers.
While it’s been quieter on the front end, there are still many stories to share with some weird and wacky incidents. This episode also includes a fun, dramatized read of an email tactic.

Join us as we discuss the following:

  • Where the team identifies on the Cyber Alignment Chart
  • Use of celebrity names within email lures
  • Recent PDF antics
  • Updates about activity from current threat actors

For more information, check out our website!
  continue reading

63 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide