Artwork

Content provided by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan

7:46
 
Share
 

Manage episode 432512906 series 3591118
Content provided by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.

Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.

Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

You can learn more about Muddled Libra at

https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

Please share your thoughts with us for future Threat Vector segments by taking our ⁠brief survey⁠.

Join the conversation on our social media channels:

Website: ⁠https://www.paloaltonetworks.com/unit42⁠

Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠

Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠

LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠

YouTube: ⁠@PaloAltoNetworksUnit42⁠

Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

About Threat Vector

Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.


PALO ALTO NETWORKS

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

  continue reading

43 episodes

Artwork
iconShare
 
Manage episode 432512906 series 3591118
Content provided by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Palo Alto Networks and N2K Networks, Palo Alto Networks, and N2K Networks or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.

Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.

Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

You can learn more about Muddled Libra at

https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

Please share your thoughts with us for future Threat Vector segments by taking our ⁠brief survey⁠.

Join the conversation on our social media channels:

Website: ⁠https://www.paloaltonetworks.com/unit42⁠

Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠

Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠

LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠

YouTube: ⁠@PaloAltoNetworksUnit42⁠

Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

About Threat Vector

Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.


PALO ALTO NETWORKS

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

  continue reading

43 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide